www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www po/home.ru-en.html po/home.ru.po proprietar...


From: GNUN
Subject: www po/home.ru-en.html po/home.ru.po proprietar...
Date: Tue, 25 Feb 2020 01:29:54 -0500 (EST)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     20/02/25 01:29:54

Modified files:
        po             : home.ru-en.html home.ru.po 
        proprietary    : malware-appliances.ru.html 
                         proprietary-insecurity.ru.html 
                         proprietary-surveillance.ru.html 
                         proprietary.ru.html 
        proprietary/po : malware-appliances.ru-en.html 
                         malware-appliances.ru.po 
                         malware-google.ru-en.html malware-google.ru.po 
                         proprietary-insecurity.ru-en.html 
                         proprietary-insecurity.ru.po 
                         proprietary-surveillance.ru-en.html 
                         proprietary-surveillance.ru.po 
                         proprietary.ru-en.html proprietary.ru.po 
        software       : recent-releases-include.ru.html 
                         software.ru.html 
        software/po    : recent-releases-include.ru.po 
                         software.ru-en.html software.ru.po 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/po/home.ru-en.html?cvsroot=www&r1=1.197&r2=1.198
http://web.cvs.savannah.gnu.org/viewcvs/www/po/home.ru.po?cvsroot=www&r1=1.630&r2=1.631
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-appliances.ru.html?cvsroot=www&r1=1.74&r2=1.75
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-insecurity.ru.html?cvsroot=www&r1=1.85&r2=1.86
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-surveillance.ru.html?cvsroot=www&r1=1.226&r2=1.227
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary.ru.html?cvsroot=www&r1=1.145&r2=1.146
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.ru-en.html?cvsroot=www&r1=1.73&r2=1.74
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.ru.po?cvsroot=www&r1=1.178&r2=1.179
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.ru-en.html?cvsroot=www&r1=1.49&r2=1.50
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.ru.po?cvsroot=www&r1=1.114&r2=1.115
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ru-en.html?cvsroot=www&r1=1.84&r2=1.85
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ru.po?cvsroot=www&r1=1.240&r2=1.241
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru-en.html?cvsroot=www&r1=1.206&r2=1.207
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru.po?cvsroot=www&r1=1.590&r2=1.591
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru-en.html?cvsroot=www&r1=1.141&r2=1.142
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.337&r2=1.338
http://web.cvs.savannah.gnu.org/viewcvs/www/software/recent-releases-include.ru.html?cvsroot=www&r1=1.1890&r2=1.1891
http://web.cvs.savannah.gnu.org/viewcvs/www/software/software.ru.html?cvsroot=www&r1=1.65&r2=1.66
http://web.cvs.savannah.gnu.org/viewcvs/www/software/po/recent-releases-include.ru.po?cvsroot=www&r1=1.2684&r2=1.2685
http://web.cvs.savannah.gnu.org/viewcvs/www/software/po/software.ru-en.html?cvsroot=www&r1=1.57&r2=1.58
http://web.cvs.savannah.gnu.org/viewcvs/www/software/po/software.ru.po?cvsroot=www&r1=1.140&r2=1.141

Patches:
Index: po/home.ru-en.html
===================================================================
RCS file: /web/www/www/po/home.ru-en.html,v
retrieving revision 1.197
retrieving revision 1.198
diff -u -b -r1.197 -r1.198
--- po/home.ru-en.html  17 Feb 2020 09:33:21 -0000      1.197
+++ po/home.ru-en.html  25 Feb 2020 06:29:52 -0000      1.198
@@ -473,6 +473,7 @@
 <ul>
 <li><span class="gnun-split"></span>
   <a href="/software/cfengine/">cfengine</a>,
+  <a href="/software/freedink/">freedink</a>,
   <a href="/software/freetalk/">freetalk</a>,
   <a href="/software/halifax/">halifax</a>,
   <a href="/software/mcron/">mcron</a>,
@@ -578,7 +579,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/02/17 09:33:21 $
+$Date: 2020/02/25 06:29:52 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/home.ru.po
===================================================================
RCS file: /web/www/www/po/home.ru.po,v
retrieving revision 1.630
retrieving revision 1.631
diff -u -b -r1.630 -r1.631
--- po/home.ru.po       25 Feb 2020 06:07:38 -0000      1.630
+++ po/home.ru.po       25 Feb 2020 06:29:52 -0000      1.631
@@ -15,7 +15,6 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2020-02-24 21:26+0000\n"
 
 # type: Content of: <title>
 #. type: Content of: <title>
@@ -578,17 +577,6 @@
 
 # type: Content of: <table><tr><td><ul><li>
 #. type: Content of: <div><div><div><ul><li>
-# | <a href=\"/software/cfengine/\">cfengine</a>, <a
-# | {+href=\"/software/freedink/\">freedink</a>, <a+}
-# | href=\"/software/freetalk/\">freetalk</a>, <a
-# | href=\"/software/halifax/\">halifax</a>, <a
-# | href=\"/software/mcron/\">mcron</a>, <a
-# | href=\"/software/quickthreads/\">quickthreads</a>
-#| msgid ""
-#| "<a href=\"/software/cfengine/\">cfengine</a>, <a href=\"/software/"
-#| "freetalk/\">freetalk</a>, <a href=\"/software/halifax/\">halifax</a>, <a "
-#| "href=\"/software/mcron/\">mcron</a>, <a href=\"/software/quickthreads/"
-#| "\">quickthreads</a>"
 msgid ""
 "<a href=\"/software/cfengine/\">cfengine</a>, <a href=\"/software/freedink/"
 "\">freedink</a>, <a href=\"/software/freetalk/\">freetalk</a>, <a href=\"/"
@@ -596,10 +584,9 @@
 "href=\"/software/quickthreads/\">quickthreads</a>"
 msgstr ""
 "<a href=\"/software/cfengine/\">cfengine</a>, <a href=\"/software/freedink/"
-"\">freedink</a>, <a href=\"/software/freetalk/"
-"\">freetalk</a>, <a href=\"/software/halifax/\">halifax</a>, <a href=\"/"
-"software/mcron/\">mcron</a>, <a href=\"/software/quickthreads/"
-"\">quickthreads</a>"
+"\">freedink</a>, <a href=\"/software/freetalk/\">freetalk</a>, <a href=\"/"
+"software/halifax/\">halifax</a>, <a href=\"/software/mcron/\">mcron</a>, <a "
+"href=\"/software/quickthreads/\">quickthreads</a>"
 
 #. type: Content of: <div><div><div><ul><li>
 msgid ", are all looking for maintainers."

Index: proprietary/malware-appliances.ru.html
===================================================================
RCS file: /web/www/www/proprietary/malware-appliances.ru.html,v
retrieving revision 1.74
retrieving revision 1.75
diff -u -b -r1.74 -r1.75
--- proprietary/malware-appliances.ru.html      19 Dec 2019 06:59:29 -0000      
1.74
+++ proprietary/malware-appliances.ru.html      25 Feb 2020 06:29:53 -0000      
1.75
@@ -66,6 +66,20 @@
 доступ к ее камерам, микрофонам и 
динамикам</a>.</p>
   </li>
 
+  <li id="M201911190">
+    <p>В привязанном к Интернету Amazon Ring была 
уязвимость, которая позволяла
+злоумышленникам <a
+href="https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password";>
+получить доступ к паролю беспроводной 
связи пользователя</a> и подглядывать
+за домом через подключенные устройства 
наблюдения.</p>
+
+    <p>Знания пароля беспроводной связи было 
бы недостаточно для проведения какой
+бы то ни было значительной слежки, если бы 
в устройствах была реализована
+серьезная защита с шифрованием. Но во 
многих устройствах с несвободными
+программами этого нет. Конечно, они тоже 
применяются их производителями для
+подглядывания.</p>
+  </li>
+
   <li id="M201904260">
     <p>Роботы-игрушки Jibo были привязаны к 
серверу производителя, и <a
 href="https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648";> 
компания
@@ -951,7 +965,7 @@
 
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright &copy; 2016, 2017, 2018, 2019 Free Software Foundation, Inc.</p>
+<p>Copyright &copy; 2016, 2017, 2018, 2019, 2020 Free Software Foundation, 
Inc.</p>
 
 <p>Это произведение доступно по <a rel="license"
 href="http://creativecommons.org/licenses/by/4.0/deed.ru";>лицензии 
Creative
@@ -970,7 +984,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Обновлено:
 
-$Date: 2019/12/19 06:59:29 $
+$Date: 2020/02/25 06:29:53 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary-insecurity.ru.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-insecurity.ru.html,v
retrieving revision 1.85
retrieving revision 1.86
diff -u -b -r1.85 -r1.86
--- proprietary/proprietary-insecurity.ru.html  19 Dec 2019 06:59:29 -0000      
1.85
+++ proprietary/proprietary-insecurity.ru.html  25 Feb 2020 06:29:53 -0000      
1.86
@@ -81,6 +81,20 @@
 доступ к ее камерам, микрофонам и 
динамикам</a>.</p>
   </li>
 
+  <li id="M201911190">
+    <p>В привязанном к Интернету Amazon Ring была 
уязвимость, которая позволяла
+злоумышленникам <a
+href="https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password";>
+получить доступ к паролю беспроводной 
связи пользователя</a> и подглядывать
+за домом через подключенные устройства 
наблюдения.</p>
+
+    <p>Знания пароля беспроводной связи было 
бы недостаточно для проведения какой
+бы то ни было значительной слежки, если бы 
в устройствах была реализована
+серьезная защита с шифрованием. Но во 
многих устройствах с несвободными
+программами этого нет. Конечно, они тоже 
применяются их производителями для
+подглядывания.</p>
+  </li>
+
   <li id="M201908310">
     <p>Ряд уязвимостей, найденных в iOS, <a
 
href="https://www.forbes.com/sites/gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-xr-update/";>позволял
@@ -745,7 +759,7 @@
 
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright &copy; 2013, 2015, 2016, 2017, 2018, 2019 Free Software
+<p>Copyright &copy; 2013, 2015, 2016, 2017, 2018, 2019, 2020 Free Software
 Foundation, Inc.</p>
 
 <p>Это произведение доступно по <a rel="license"
@@ -765,7 +779,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Обновлено:
 
-$Date: 2019/12/19 06:59:29 $
+$Date: 2020/02/25 06:29:53 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary-surveillance.ru.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-surveillance.ru.html,v
retrieving revision 1.226
retrieving revision 1.227
diff -u -b -r1.226 -r1.227
--- proprietary/proprietary-surveillance.ru.html        17 Feb 2020 09:33:21 
-0000      1.226
+++ proprietary/proprietary-surveillance.ru.html        25 Feb 2020 06:29:53 
-0000      1.227
@@ -2033,6 +2033,20 @@
 </div>
 
 <ul class="blurbs">
+  <li id="M201911190">
+    <p>В привязанном к Интернету Amazon Ring была 
уязвимость, которая позволяла
+злоумышленникам <a
+href="https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password";>
+получить доступ к паролю беспроводной 
связи пользователя</a> и подглядывать
+за домом через подключенные устройства 
наблюдения.</p>
+
+    <p>Знания пароля беспроводной связи было 
бы недостаточно для проведения какой
+бы то ни было значительной слежки, если бы 
в устройствах была реализована
+серьезная защита с шифрованием. Но во 
многих устройствах с несвободными
+программами этого нет. Конечно, они тоже 
применяются их производителями для
+подглядывания.</p>
+  </li>
+
   <li id="M201907210">
     <p>&ldquo;Помощник&rdquo; Google записывает 
разговоры, <a
 
href="https://arstechnica.com/information-technology/2019/07/google-defends-listening-to-ok-google-queries-after-voice-recordings-leak/";>даже
@@ -2692,7 +2706,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Обновлено:
 
-$Date: 2020/02/17 09:33:21 $
+$Date: 2020/02/25 06:29:53 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary.ru.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary.ru.html,v
retrieving revision 1.145
retrieving revision 1.146
diff -u -b -r1.145 -r1.146
--- proprietary/proprietary.ru.html     17 Feb 2020 09:33:21 -0000      1.145
+++ proprietary/proprietary.ru.html     25 Feb 2020 06:29:53 -0000      1.146
@@ -188,16 +188,18 @@
 <h3 id="latest">Последние добавления</h3>
 
 <ul class="blurbs">
-  <li id="M202002020">
-    <p>Многие приложения Android надувают своих 
пользователей, прося их решить,
-какие разрешения дать программе, а затем <a
-href="https://nakedsecurity.sophos.com/2019/07/10/android-apps-sidestepping-permissions-to-access-sensitive-data/";>
-обходя эти разрешения</a>.</p>
-
-    <p>Предполагается, что система Android будет 
предотвращать утечку данных,
-выполняя приложения в изолированных 
песочницах, но разработчики нашли пути
-доступа к данных с помощью других средств, 
и пользователь никак не может
-помешать им это делать, поскольку как 
система, так и приложения несвободны.</p>
+  <li id="M201911190">
+    <p>В привязанном к Интернету Amazon Ring была 
уязвимость, которая позволяла
+злоумышленникам <a
+href="https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password";>
+получить доступ к паролю беспроводной 
связи пользователя</a> и подглядывать
+за домом через подключенные устройства 
наблюдения.</p>
+
+    <p>Знания пароля беспроводной связи было 
бы недостаточно для проведения какой
+бы то ни было значительной слежки, если бы 
в устройствах была реализована
+серьезная защита с шифрованием. Но во 
многих устройствах с несвободными
+программами этого нет. Конечно, они тоже 
применяются их производителями для
+подглядывания.</p>
   </li>
 
   <li id="M201912220">
@@ -222,6 +224,18 @@
 программами (а сама система представляет 
изначальную вредоносную программу).</p>
   </li>
 
+  <li id="M202002020">
+    <p>Многие приложения Android надувают своих 
пользователей, прося их решить,
+какие разрешения дать программе, а затем <a
+href="https://nakedsecurity.sophos.com/2019/07/10/android-apps-sidestepping-permissions-to-access-sensitive-data/";>
+обходя эти разрешения</a>.</p>
+
+    <p>Предполагается, что система Android будет 
предотвращать утечку данных,
+выполняя приложения в изолированных 
песочницах, но разработчики нашли пути
+доступа к данных с помощью других средств, 
и пользователь никак не может
+помешать им это делать, поскольку как 
система, так и приложения несвободны.</p>
+  </li>
+
   <li id="M201912171">
     <p>Современные автомобили сейчас <a
 href="https://boingboing.net/2019/12/17/cars-now-run-on-the-new-oil.html";>
@@ -230,16 +244,6 @@
 со взломом автомобильного компьютера, 
который всегда скрыт и работает под
 управлением несвободных программ.</p>
   </li>
-
-  <li id="M201912090">
-    <p>Ай-чудовища и телефоны с Android, когда ими 
пользуются для работы,
-предоставляют работодателям мощные <a
-href="https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-for-work-say-goodbye-to-your-privacy";>
-возможности слежки и саботажа</a>, если они 
устанавливают свои программы на
-устройство. Многие работодатели требуют 
этого. Для работника это просто
-несвободная программа, так же 
принципиально несправедливая и опасная, 
как
-любая другая несвободная программа.</p>
-  </li>
 </ul>
 
 </div>
@@ -321,7 +325,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Обновлено:
 
-$Date: 2020/02/17 09:33:21 $
+$Date: 2020/02/25 06:29:53 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/po/malware-appliances.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.ru-en.html,v
retrieving revision 1.73
retrieving revision 1.74
diff -u -b -r1.73 -r1.74
--- proprietary/po/malware-appliances.ru-en.html        19 Dec 2019 06:59:30 
-0000      1.73
+++ proprietary/po/malware-appliances.ru-en.html        25 Feb 2020 06:29:53 
-0000      1.74
@@ -59,6 +59,20 @@
     its camera, speakers and microphones</a>.</p>
   </li>
 
+  <li id="M201911190">
+    <p>Internet-tethered Amazon Ring had
+    a security vulnerability that enabled attackers to <a
+    
href="https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password";>
+    access the user's wifi password</a>, and snoop on the household
+    through connected surveillance devices.</p>
+
+    <p>Knowledge of the wifi password would not be sufficient to carry
+    out any significant surveillance if the devices implemented proper
+    security, including encryption. But many devices with proprietary
+    software lack this. Of course, they are also used by their
+    manufacturers for snooping.</p>
+  </li>
+
   <li id="M201904260">
     <p>The Jibo robot toys were tethered to the manufacturer's server,
     and <a href="https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648";>
@@ -930,7 +944,7 @@
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. -->
 
-<p>Copyright &copy; 2016, 2017, 2018, 2019 Free Software Foundation, Inc.</p>
+<p>Copyright &copy; 2016, 2017, 2018, 2019, 2020 Free Software Foundation, 
Inc.</p>
 
 <p>This page is licensed under a <a rel="license"
 href="http://creativecommons.org/licenses/by/4.0/";>Creative
@@ -940,7 +954,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/12/19 06:59:30 $
+$Date: 2020/02/25 06:29:53 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/malware-appliances.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.ru.po,v
retrieving revision 1.178
retrieving revision 1.179
diff -u -b -r1.178 -r1.179
--- proprietary/po/malware-appliances.ru.po     24 Feb 2020 17:03:36 -0000      
1.178
+++ proprietary/po/malware-appliances.ru.po     25 Feb 2020 06:29:53 -0000      
1.179
@@ -15,7 +15,6 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2020-02-24 16:55+0000\n"
 
 #. type: Content of: <title>
 msgid "Malware in Appliances - GNU Project - Free Software Foundation"
@@ -91,6 +90,11 @@
 "the user's wifi password</a>, and snoop on the household through connected "
 "surveillance devices."
 msgstr ""
+"В привязанном к Интернету Amazon Ring была 
уязвимость, которая позволяла "
+"злоумышленникам <a 
href=\"https://www.commondreams.org/newswire/2019/11/07/";
+"amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password\"> "
+"получить доступ к паролю беспроводной 
связи пользователя</a> и подглядывать "
+"за домом через подключенные устройства 
наблюдения."
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
@@ -99,6 +103,11 @@
 "including encryption. But many devices with proprietary software lack this. "
 "Of course, they are also used by their manufacturers for snooping."
 msgstr ""
+"Знания пароля беспроводной связи было бы 
недостаточно для проведения какой "
+"бы то ни было значительной слежки, если бы 
в устройствах была реализована "
+"серьезная защита с шифрованием. Но во 
многих устройствах с несвободными "
+"программами этого нет. Конечно, они тоже 
применяются их производителями для "
+"подглядывания."
 
 #. type: Content of: <div><ul><li><p>
 msgid ""

Index: proprietary/po/malware-google.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.ru-en.html,v
retrieving revision 1.49
retrieving revision 1.50
diff -u -b -r1.49 -r1.50
--- proprietary/po/malware-google.ru-en.html    6 Feb 2020 17:35:00 -0000       
1.49
+++ proprietary/po/malware-google.ru-en.html    25 Feb 2020 06:29:53 -0000      
1.50
@@ -317,7 +317,7 @@
 
   <li id="M201904130">
     <p>Google tracks the movements of Android phones and iPhones
-    running Goggle apps, and sometimes <a
+    running Google apps, and sometimes <a
     
href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html";>
     saves the data for years</a>.</p>
 
@@ -555,7 +555,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/02/06 17:35:00 $
+$Date: 2020/02/25 06:29:53 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/malware-google.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.ru.po,v
retrieving revision 1.114
retrieving revision 1.115
diff -u -b -r1.114 -r1.115
--- proprietary/po/malware-google.ru.po 21 Feb 2020 23:32:16 -0000      1.114
+++ proprietary/po/malware-google.ru.po 25 Feb 2020 06:29:53 -0000      1.115
@@ -15,7 +15,6 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2020-02-21 23:25+0000\n"
 
 #. type: Content of: <title>
 msgid "Google's Software Is Malware - GNU Project - Free Software Foundation"
@@ -563,16 +562,6 @@
 "защиты личной жизни пользователей."
 
 #. type: Content of: <div><ul><li><p>
-# | Google tracks the movements of Android phones and iPhones running
-# | Go[-g-]{+o+}gle apps, and sometimes <a
-# | 
href=\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html\";>
-# | saves the data for years</a>.
-#, fuzzy
-#| msgid ""
-#| "Google tracks the movements of Android phones and iPhones running Goggle "
-#| "apps, and sometimes <a href=\"https://www.nytimes.com/";
-#| "interactive/2019/04/13/us/google-location-tracking-police.html\"> saves "
-#| "the data for years</a>."
 msgid ""
 "Google tracks the movements of Android phones and iPhones running Google "
 "apps, and sometimes <a href=\"https://www.nytimes.com/interactive/2019/04/13/";

Index: proprietary/po/proprietary-insecurity.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ru-en.html,v
retrieving revision 1.84
retrieving revision 1.85
diff -u -b -r1.84 -r1.85
--- proprietary/po/proprietary-insecurity.ru-en.html    19 Dec 2019 06:59:30 
-0000      1.84
+++ proprietary/po/proprietary-insecurity.ru-en.html    25 Feb 2020 06:29:53 
-0000      1.85
@@ -73,6 +73,20 @@
     its camera, speakers and microphones</a>.</p>
   </li>
 
+  <li id="M201911190">
+    <p>Internet-tethered Amazon Ring had
+    a security vulnerability that enabled attackers to <a
+    
href="https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password";>
+    access the user's wifi password</a>, and snoop on the household
+    through connected surveillance devices.</p>
+
+    <p>Knowledge of the wifi password would not be sufficient to carry
+    out any significant surveillance if the devices implemented proper
+    security, including encryption. But many devices with proprietary
+    software lack this. Of course, they are also used by their
+    manufacturers for snooping.</p>
+  </li>
+
   <li id="M201908310">
     <p>A series of vulnerabilities <a
     
href="https://www.forbes.com/sites/gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-xr-update/";>found
@@ -726,7 +740,7 @@
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. -->
 
-<p>Copyright &copy; 2013, 2015, 2016, 2017, 2018, 2019 Free Software 
Foundation, Inc.</p>
+<p>Copyright &copy; 2013, 2015, 2016, 2017, 2018, 2019, 2020 Free Software 
Foundation, Inc.</p>
 
 <p>This page is licensed under a <a rel="license"
 href="http://creativecommons.org/licenses/by/4.0/";>Creative
@@ -736,7 +750,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/12/19 06:59:30 $
+$Date: 2020/02/25 06:29:53 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary-insecurity.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ru.po,v
retrieving revision 1.240
retrieving revision 1.241
diff -u -b -r1.240 -r1.241
--- proprietary/po/proprietary-insecurity.ru.po 24 Feb 2020 17:03:37 -0000      
1.240
+++ proprietary/po/proprietary-insecurity.ru.po 25 Feb 2020 06:29:53 -0000      
1.241
@@ -15,7 +15,6 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2020-02-24 16:55+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Insecurity - GNU Project - Free Software Foundation"
@@ -119,6 +118,11 @@
 "the user's wifi password</a>, and snoop on the household through connected "
 "surveillance devices."
 msgstr ""
+"В привязанном к Интернету Amazon Ring была 
уязвимость, которая позволяла "
+"злоумышленникам <a 
href=\"https://www.commondreams.org/newswire/2019/11/07/";
+"amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password\"> "
+"получить доступ к паролю беспроводной 
связи пользователя</a> и подглядывать "
+"за домом через подключенные устройства 
наблюдения."
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
@@ -127,6 +131,11 @@
 "including encryption. But many devices with proprietary software lack this. "
 "Of course, they are also used by their manufacturers for snooping."
 msgstr ""
+"Знания пароля беспроводной связи было бы 
недостаточно для проведения какой "
+"бы то ни было значительной слежки, если бы 
в устройствах была реализована "
+"серьезная защита с шифрованием. Но во 
многих устройствах с несвободными "
+"программами этого нет. Конечно, они тоже 
применяются их производителями для "
+"подглядывания."
 
 #. type: Content of: <div><ul><li><p>
 msgid ""

Index: proprietary/po/proprietary-surveillance.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru-en.html,v
retrieving revision 1.206
retrieving revision 1.207
diff -u -b -r1.206 -r1.207
--- proprietary/po/proprietary-surveillance.ru-en.html  17 Feb 2020 09:33:21 
-0000      1.206
+++ proprietary/po/proprietary-surveillance.ru-en.html  25 Feb 2020 06:29:53 
-0000      1.207
@@ -962,7 +962,7 @@
 
   <li id="M201904130">
     <p>Google tracks the movements of Android phones and iPhones
-    running Goggle apps, and sometimes <a
+    running Google apps, and sometimes <a
     
href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html";>
     saves the data for years</a>.</p>
 
@@ -1964,6 +1964,20 @@
 </div>
 
 <ul class="blurbs">
+  <li id="M201911190">
+    <p>Internet-tethered Amazon Ring had
+    a security vulnerability that enabled attackers to <a
+    
href="https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password";>
+    access the user's wifi password</a>, and snoop on the household
+    through connected surveillance devices.</p>
+
+    <p>Knowledge of the wifi password would not be sufficient to carry
+    out any significant surveillance if the devices implemented proper
+    security, including encryption. But many devices with proprietary
+    software lack this. Of course, they are also used by their
+    manufacturers for snooping.</p>
+  </li>
+
   <li id="M201907210">
     <p>Google &ldquo;Assistant&rdquo; records users' conversations <a
     
href="https://arstechnica.com/information-technology/2019/07/google-defends-listening-to-ok-google-queries-after-voice-recordings-leak/";>even
@@ -2583,7 +2597,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/02/17 09:33:21 $
+$Date: 2020/02/25 06:29:53 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary-surveillance.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru.po,v
retrieving revision 1.590
retrieving revision 1.591
diff -u -b -r1.590 -r1.591
--- proprietary/po/proprietary-surveillance.ru.po       24 Feb 2020 17:03:37 
-0000      1.590
+++ proprietary/po/proprietary-surveillance.ru.po       25 Feb 2020 06:29:53 
-0000      1.591
@@ -15,7 +15,6 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2020-02-21 23:25+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Surveillance - GNU Project - Free Software Foundation"
@@ -1766,16 +1765,6 @@
 "разрабатывается новая программа</a>."
 
 #. type: Content of: <div><ul><li><p>
-# | Google tracks the movements of Android phones and iPhones running
-# | Go[-g-]{+o+}gle apps, and sometimes <a
-# | 
href=\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html\";>
-# | saves the data for years</a>.
-#, fuzzy
-#| msgid ""
-#| "Google tracks the movements of Android phones and iPhones running Goggle "
-#| "apps, and sometimes <a href=\"https://www.nytimes.com/";
-#| "interactive/2019/04/13/us/google-location-tracking-police.html\"> saves "
-#| "the data for years</a>."
 msgid ""
 "Google tracks the movements of Android phones and iPhones running Google "
 "apps, and sometimes <a href=\"https://www.nytimes.com/interactive/2019/04/13/";
@@ -3719,6 +3708,11 @@
 "the user's wifi password</a>, and snoop on the household through connected "
 "surveillance devices."
 msgstr ""
+"В привязанном к Интернету Amazon Ring была 
уязвимость, которая позволяла "
+"злоумышленникам <a 
href=\"https://www.commondreams.org/newswire/2019/11/07/";
+"amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password\"> "
+"получить доступ к паролю беспроводной 
связи пользователя</a> и подглядывать "
+"за домом через подключенные устройства 
наблюдения."
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
@@ -3727,6 +3721,11 @@
 "including encryption. But many devices with proprietary software lack this. "
 "Of course, they are also used by their manufacturers for snooping."
 msgstr ""
+"Знания пароля беспроводной связи было бы 
недостаточно для проведения какой "
+"бы то ни было значительной слежки, если бы 
в устройствах была реализована "
+"серьезная защита с шифрованием. Но во 
многих устройствах с несвободными "
+"программами этого нет. Конечно, они тоже 
применяются их производителями для "
+"подглядывания."
 
 #. type: Content of: <div><ul><li><p>
 msgid ""

Index: proprietary/po/proprietary.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru-en.html,v
retrieving revision 1.141
retrieving revision 1.142
diff -u -b -r1.141 -r1.142
--- proprietary/po/proprietary.ru-en.html       17 Feb 2020 09:33:21 -0000      
1.141
+++ proprietary/po/proprietary.ru-en.html       25 Feb 2020 06:29:53 -0000      
1.142
@@ -173,16 +173,18 @@
 <h3 id="latest">Latest additions</h3>
 
 <ul class="blurbs">
-  <li id="M202002020">
-    <p>Many Android apps fool their users by asking
-    them to decide what permissions to give the program, and then <a
-    
href="https://nakedsecurity.sophos.com/2019/07/10/android-apps-sidestepping-permissions-to-access-sensitive-data/";>
-    bypassing these permissions</a>.</p>
-
-    <p>The Android system is supposed to prevent data leaks by running apps
-    in isolated sandboxes, but developers have found ways to access the
-    data by other means, and there is nothing the user can do to stop
-    them from doing so, since both the system and the apps are nonfree.</p>
+  <li id="M201911190">
+    <p>Internet-tethered Amazon Ring had
+    a security vulnerability that enabled attackers to <a
+    
href="https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password";>
+    access the user's wifi password</a>, and snoop on the household
+    through connected surveillance devices.</p>
+
+    <p>Knowledge of the wifi password would not be sufficient to carry
+    out any significant surveillance if the devices implemented proper
+    security, including encryption. But many devices with proprietary
+    software lack this. Of course, they are also used by their
+    manufacturers for snooping.</p>
   </li>
 
   <li id="M201912220">
@@ -207,6 +209,18 @@
     additional malware (the system itself being the original malware).</p>
   </li>
 
+  <li id="M202002020">
+    <p>Many Android apps fool their users by asking
+    them to decide what permissions to give the program, and then <a
+    
href="https://nakedsecurity.sophos.com/2019/07/10/android-apps-sidestepping-permissions-to-access-sensitive-data/";>
+    bypassing these permissions</a>.</p>
+
+    <p>The Android system is supposed to prevent data leaks by running apps
+    in isolated sandboxes, but developers have found ways to access the
+    data by other means, and there is nothing the user can do to stop
+    them from doing so, since both the system and the apps are nonfree.</p>
+  </li>
+
   <li id="M201912171">
     <p>Most modern cars now <a
     href="https://boingboing.net/2019/12/17/cars-now-run-on-the-new-oil.html";>
@@ -215,16 +229,6 @@
     cracking the car's computer, which is always hidden and running with
     proprietary software.</p>
   </li>
-
-  <li id="M201912090">
-    <p>iMonsters and Android phones,
-    when used for work, give employers powerful <a
-    
href="https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-for-work-say-goodbye-to-your-privacy";>
-    snooping and sabotage capabilities</a> if they install their own
-    software on the device.  Many employers demand to do this.  For the
-    employee, this is simply nonfree software, as fundamentally unjust
-    and as dangerous as any other nonfree software.</p>
-  </li>
 </ul>
 
 </div>
@@ -286,7 +290,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/02/17 09:33:21 $
+$Date: 2020/02/25 06:29:53 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.337
retrieving revision 1.338
diff -u -b -r1.337 -r1.338
--- proprietary/po/proprietary.ru.po    24 Feb 2020 17:03:38 -0000      1.337
+++ proprietary/po/proprietary.ru.po    25 Feb 2020 06:29:53 -0000      1.338
@@ -15,7 +15,6 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2020-02-24 16:55+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -318,6 +317,11 @@
 "the user's wifi password</a>, and snoop on the household through connected "
 "surveillance devices."
 msgstr ""
+"В привязанном к Интернету Amazon Ring была 
уязвимость, которая позволяла "
+"злоумышленникам <a 
href=\"https://www.commondreams.org/newswire/2019/11/07/";
+"amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password\"> "
+"получить доступ к паролю беспроводной 
связи пользователя</a> и подглядывать "
+"за домом через подключенные устройства 
наблюдения."
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
@@ -326,6 +330,11 @@
 "including encryption. But many devices with proprietary software lack this. "
 "Of course, they are also used by their manufacturers for snooping."
 msgstr ""
+"Знания пароля беспроводной связи было бы 
недостаточно для проведения какой "
+"бы то ни было значительной слежки, если бы 
в устройствах была реализована "
+"серьезная защита с шифрованием. Но во 
многих устройствах с несвободными "
+"программами этого нет. Конечно, они тоже 
применяются их производителями для "
+"подглядывания."
 
 #. type: Content of: <div><ul><li><p>
 msgid ""

Index: software/recent-releases-include.ru.html
===================================================================
RCS file: /web/www/www/software/recent-releases-include.ru.html,v
retrieving revision 1.1890
retrieving revision 1.1891
diff -u -b -r1.1890 -r1.1891
--- software/recent-releases-include.ru.html    25 Feb 2020 01:30:13 -0000      
1.1890
+++ software/recent-releases-include.ru.html    25 Feb 2020 06:29:53 -0000      
1.1891
@@ -1,41 +1,41 @@
 
 <!--#set var="LINK_CLOSE" value="</a>, <i>" -->
 <ul>
-<li><strong>February 24, 2020</strong>
+<li><strong>24 февраля 2020</strong>
 <ul>
 <li><!--#set var="LINK" 
 value='<a href="//lists.gnu.org/archive/html/info-gnu/2020-02/msg00015.html">' 
-->
 <!--#echo 
 encoding="none" var="LINK" -->
-GNU Datamash 1.6 released<!--#echo 
+Выпущен GNU Datamash 1.6<!--#echo 
 encoding="none" var="LINK_CLOSE" -->
 Ассаф Гордон<!--#set 
 var="TIME" value="</i>, <tt>20:11</tt>" -->
 <!--#echo encoding="none" var="TIME" -->
 </li>
 </ul></li>
-<li><strong>February 23, 2020</strong>
+<li><strong>23 февраля 2020</strong>
 <ul>
 <li><!--#set var="LINK" 
 value='<a href="//lists.gnu.org/archive/html/info-gnu/2020-02/msg00014.html">' 
-->
 <!--#echo 
 encoding="none" var="LINK" -->
-Structure and Administration of the GNU Project<!--#echo 
+Структура и администрация проекта GNU<!--#echo 
 encoding="none" var="LINK_CLOSE" -->
 Ричард Столмен<!--#set 
 var="TIME" value="</i>, <tt>08:49</tt>" -->
 <!--#echo encoding="none" var="TIME" -->
 </li>
 </ul></li>
-<li><strong>February 22, 2020</strong>
+<li><strong>22 февраля 2020</strong>
 <ul>
 <li><!--#set var="LINK" 
 value='<a href="//lists.gnu.org/archive/html/info-gnu/2020-02/msg00013.html">' 
-->
 <!--#echo 
 encoding="none" var="LINK" -->
-GNU ed 1.16 released<!--#echo 
+Выпущен GNU ed 1.16<!--#echo 
 encoding="none" var="LINK_CLOSE" -->
-Antonio Diaz Diaz<!--#set 
+Антонио Диаз Диаз<!--#set 
 var="TIME" value="</i>, <tt>16:41</tt>" -->
 <!--#echo encoding="none" var="TIME" -->
 </li>

Index: software/software.ru.html
===================================================================
RCS file: /web/www/www/software/software.ru.html,v
retrieving revision 1.65
retrieving revision 1.66
diff -u -b -r1.65 -r1.66
--- software/software.ru.html   23 Nov 2019 16:29:03 -0000      1.65
+++ software/software.ru.html   25 Feb 2020 06:29:53 -0000      1.66
@@ -333,7 +333,7 @@
 
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright &copy; 2015, 2016, 2018, 2019 Free Software Foundation, Inc.</p>
+<p>Copyright &copy; 2015, 2016, 2018, 2019, 2020 Free Software Foundation, 
Inc.</p>
 
 <p>Это произведение доступно по <a rel="license"
 href="http://creativecommons.org/licenses/by-nd/4.0/deed.ru";>лицензии
@@ -349,7 +349,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Обновлено:
 
-$Date: 2019/11/23 16:29:03 $
+$Date: 2020/02/25 06:29:53 $
 
 <!-- timestamp end -->
 </p>

Index: software/po/recent-releases-include.ru.po
===================================================================
RCS file: /web/www/www/software/po/recent-releases-include.ru.po,v
retrieving revision 1.2684
retrieving revision 1.2685
diff -u -b -r1.2684 -r1.2685
--- software/po/recent-releases-include.ru.po   25 Feb 2020 06:07:39 -0000      
1.2684
+++ software/po/recent-releases-include.ru.po   25 Feb 2020 06:29:54 -0000      
1.2685
@@ -14,11 +14,8 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2020-02-22 21:57+0000\n"
 
 #. type: Content of: <ul><li>
-# | <strong>February [-16,-] {+24,+} 2020</strong>
-#| msgid "<strong>February 16, 2020</strong>"
 msgid "<strong>February 24, 2020</strong>"
 msgstr "<strong>24 февраля 2020</strong>"
 
@@ -27,8 +24,6 @@
 #. #echo 
 #. encoding="none" var="LINK" 
 #. type: Content of: <ul><li><ul><li>
-# | GNU Datamash 1.[-5-]{+6+} released
-#| msgid "GNU Datamash 1.5 released"
 msgid "GNU Datamash 1.6 released"
 msgstr "Выпущен GNU Datamash 1.6"
 
@@ -39,8 +34,6 @@
 msgstr "Ассаф Гордон"
 
 #. type: Content of: <ul><li>
-# | <strong>February [-16,-] {+23,+} 2020</strong>
-#| msgid "<strong>February 16, 2020</strong>"
 msgid "<strong>February 23, 2020</strong>"
 msgstr "<strong>23 февраля 2020</strong>"
 
@@ -60,8 +53,6 @@
 msgstr "Ричард Столмен"
 
 #. type: Content of: <ul><li>
-# | <strong>February [-16,-] {+22,+} 2020</strong>
-#| msgid "<strong>February 16, 2020</strong>"
 msgid "<strong>February 22, 2020</strong>"
 msgstr "<strong>22 февраля 2020</strong>"
 
@@ -70,8 +61,6 @@
 #. #echo 
 #. encoding="none" var="LINK" 
 #. type: Content of: <ul><li><ul><li>
-# | GNU [-SASL 1.8.1-] {+ed 1.16+} released
-#| msgid "GNU SASL 1.8.1 released"
 msgid "GNU ed 1.16 released"
 msgstr "Выпущен GNU ed 1.16"
 

Index: software/po/software.ru-en.html
===================================================================
RCS file: /web/www/www/software/po/software.ru-en.html,v
retrieving revision 1.57
retrieving revision 1.58
diff -u -b -r1.57 -r1.58
--- software/po/software.ru-en.html     23 Nov 2019 16:29:03 -0000      1.57
+++ software/po/software.ru-en.html     25 Feb 2020 06:29:54 -0000      1.58
@@ -365,7 +365,7 @@
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. -->
 
-<p>Copyright &copy; 2015, 2016, 2018, 2019 Free Software Foundation, Inc.</p>
+<p>Copyright &copy; 2015, 2016, 2018, 2019, 2020 Free Software Foundation, 
Inc.</p>
 
 <p>This page is licensed under a <a rel="license"
 href="http://creativecommons.org/licenses/by-nd/4.0/";>Creative
@@ -375,7 +375,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/11/23 16:29:03 $
+$Date: 2020/02/25 06:29:54 $
 <!-- timestamp end -->
 </p>
 </div>

Index: software/po/software.ru.po
===================================================================
RCS file: /web/www/www/software/po/software.ru.po,v
retrieving revision 1.140
retrieving revision 1.141
diff -u -b -r1.140 -r1.141
--- software/po/software.ru.po  25 Feb 2020 06:07:39 -0000      1.140
+++ software/po/software.ru.po  25 Feb 2020 06:29:54 -0000      1.141
@@ -16,7 +16,6 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2020-02-24 08:25+0000\n"
 
 #. type: Content of: <title>
 msgid "Software - GNU Project - Free Software Foundation"
@@ -351,58 +350,6 @@
 msgstr "Списанные пакеты GNU"
 
 #. type: Content of: <p>
-# || No change detected.  The change might only be in amounts of spaces.
-#| msgid ""
-#| "GNU packages are occasionally decommissioned, generally because they've "
-#| "been superseded by, or integrated into, other packages.  If you have time "
-#| "and interest in resurrecting any of these, please contact <a href="
-#| "\"mailto:address@hidden\";>&lt;address@hidden&gt;</a>.  Here is "
-#| "the list; we leave the old project pages up (when they existed): <a href="
-#| "\"abcsh/\">abcsh</a>, <a href=\"aeneas/\">aeneas</a>, <a href="
-#| "\"aetherspace/\">aetherspace</a>, <a href=\"alexandria/\">alexandria</a>, "
-#| "<a href=\"aroundme/\">aroundme</a>, <a href=\"awacs/\">awacs</a>, <a href="
-#| "\"cfs-el/\">cfs-el</a>, <a href=\"checker/\">checker</a>, <a href=\"cons/"
-#| "\">cons</a>, <a href=\"dbmanual/\">dbmanual</a>, <a href=\"dgs/\">dgs</"
-#| "a>, <a href=\"dld/\">dld</a>, <a href=\"dotgnu/\">dotgnu</a>, <a href="
-#| "\"dotgnu-pnet/\">dotgnu-pnet</a>, <a href=\"dotgnu-see/\">dotgnu-see</a>, "
-#| "<a href=\"drgenius/\">drgenius</a>, <a href=\"elib/\">elib</a>, <a href="
-#| "\"fcrypt/\">fcrypt</a>, <a href=\"ffp/\">ffp</a>, <a href=\"fhp/\">fhp</"
-#| "a>, <a href=\"free/\">free</a>, <a href=\"gcron/\">gcron</a>, <a href="
-#| "\"gfe/\">gfe</a>, <a href=\"ggv/\">ggv</a>, <a href=\"gicqd/\">gicqd</a>, "
-#| "<a href=\"giptables/\">giptables</a>, <a href=\"gmorph/\">gmorph</a>, <a "
-#| "href=\"gnochive/\">gnochive</a>, <a href=\"gnotary/\">gnotary</a>, <a "
-#| "href=\"gnotepad/\">gnotepad</a>, <a href=\"gnu3dkit/\">gnu3dkit</a>, <a "
-#| "href=\"gnubios/\">gnubios</a>, <a href=\"gnu-arch/\">gnu-arch</a>, <a "
-#| "href=\"gnu-queue/\">gnu-queue</a>, <a href=\"gnucad/\">gnucad</a>, <a "
-#| "href=\"gnue-sb/\">gnue-sb</a>, <a href=\"gnufi/\">gnufi</a>, <a href="
-#| "\"gnupedia/\">gnupedia</a>, <a href=\"gnuskies/\">gnuskies</a>, <a href="
-#| "\"gnusql/\">gnusql</a>, <a href=\"gnustep-db/\">gnustep-db</a>, <a href="
-#| "\"gnuts/\">gnuts</a>, <a href=\"goldwater/\">goldwater</a>, <a href="
-#| "\"goose/\">goose</a>, <a href=\"gphoto/\">gphoto</a>, <a href=\"graphics/"
-#| "\">graphics</a>, <a href=\"grover/\">grover</a>, <a href=\"gtkeditor/"
-#| "\">gtkeditor</a>, <a href=\"gtkeyboard/\">gtkeyboard</a>, <a href=\"guss/"
-#| "\">guss</a>, <a href=\"hegemonie/\">hegemonie</a>, <a href=\"hydrant/"
-#| "\">hydrant</a>, <a href=\"isofsmk/\">isofsmk</a>, <a href=\"jdresolve/"
-#| "\">jdresolve</a>, <a href=\"lengualibre/\">lengualibre</a>, <a href="
-#| "\"leonardo/\">leonardo</a>, <a href=\"libcvs-spec/\">libcvs-spec</a>, <a "
-#| "href=\"libopts/\">libopts</a>, <a href=\"m68hc11/\">m68hc11</a>, <a href="
-#| "\"mana/\">mana</a>, <a href=\"mathmoon/\">mathmoon</a>, <a href="
-#| "\"messenger/\">messenger</a>, <a href=\"mgcp/\">mgcp</a>, <a href="
-#| "\"mll2html/\">mll2html</a>, <a href=\"myserver/\">myserver</a>, <a href="
-#| "\"obst/\">obst</a>, <a href=\"octal/\">octal</a>, <a href=\"p2c/\">p2c</"
-#| "a>, <a href=\"packaging/\">packaging</a>, <a href=\"paperclips/"
-#| "\">paperclips</a>, <a href=\"patchwork/\">patchwork</a>, <a href="
-#| "\"phpgroupware/\">phpgroupware</a>, <a href=\"pier/\">pier</a>, <a href="
-#| "\"pips/\">pips</a>, <a href=\"poc/\">poc</a>, <a href=\"proto/\">proto</"
-#| "a>, <a href=\"radar/\">radar</a>, <a href=\"rat/\">rat</a>, <a href="
-#| "\"regex/\">regex</a>, <a href=\"snakecharmer/\">snakecharmer</a>, <a href="
-#| "\"songanizer/\">songanizer</a>, <a href=\"sourceinstall/\">sourceinstall</"
-#| "a>, <a href=\"sovix/\">sovix</a>, <a href=\"sweater/\">sweater</a>, <a "
-#| "href=\"sxml/\">sxml</a>, <a href=\"toutdoux/\">toutdoux</a>, <a href="
-#| "\"url/\">url</a>, <a href=\"vmslib/\">vmslib</a>, <a href=\"vtags/"
-#| "\">vtags</a>, <a href=\"webpublish/\">webpublish</a>, <a href=\"xbase/"
-#| "\">xbase</a>, <a href=\"xhippo/\">xhippo</a>, <a href=\"xinfo/\">xinfo</"
-#| "a>, <a href=\"xmhtml/\">xmhtml</a>, <a href=\"zebra/\">zebra</a>."
 msgid ""
 "GNU packages are occasionally decommissioned, generally because they've been "
 "superseded by, or integrated into, other packages.  If you have time and "
@@ -553,13 +500,10 @@
 "translations.html\">&ldquo;Руководстве по 
переводам&rdquo;</a>."
 
 #. type: Content of: <div><p>
-# | Copyright &copy; 2015, 2016, 2018, [-2019-] {+2019, 2020+} Free Software
-# | Foundation, Inc.
-#| msgid ""
-#| "Copyright &copy; 2015, 2016, 2018, 2019 Free Software Foundation, Inc."
 msgid ""
 "Copyright &copy; 2015, 2016, 2018, 2019, 2020 Free Software Foundation, Inc."
-msgstr "Copyright &copy; 2015, 2016, 2018, 2019, 2020 Free Software 
Foundation, Inc."
+msgstr ""
+"Copyright &copy; 2015, 2016, 2018, 2019, 2020 Free Software Foundation, Inc."
 
 #. type: Content of: <div><p>
 msgid ""



reply via email to

[Prev in Thread] Current Thread [Next in Thread]