[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www graphics/graphics.es.html graphics/po/graph...
From: |
GNUN |
Subject: |
www graphics/graphics.es.html graphics/po/graph... |
Date: |
Thu, 26 Mar 2020 07:32:23 -0400 (EDT) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 20/03/26 07:32:23
Modified files:
graphics : graphics.es.html
graphics/po : graphics.es-en.html graphics.es.po
proprietary : malware-appliances.es.html
malware-mobiles.es.html
proprietary-insecurity.es.html
proprietary.es.html
proprietary/po : es.po malware-appliances.es-en.html
malware-mobiles.es-en.html
malware-mobiles.es.po
proprietary-insecurity.es-en.html
proprietary.es-en.html
server : mirror.es.html sitemap.es.html
server/po : mirror.es-en.html sitemap.es-en.html
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/graphics/graphics.es.html?cvsroot=www&r1=1.80&r2=1.81
http://web.cvs.savannah.gnu.org/viewcvs/www/graphics/po/graphics.es-en.html?cvsroot=www&r1=1.54&r2=1.55
http://web.cvs.savannah.gnu.org/viewcvs/www/graphics/po/graphics.es.po?cvsroot=www&r1=1.142&r2=1.143
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-appliances.es.html?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-mobiles.es.html?cvsroot=www&r1=1.71&r2=1.72
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-insecurity.es.html?cvsroot=www&r1=1.12&r2=1.13
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary.es.html?cvsroot=www&r1=1.89&r2=1.90
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.252&r2=1.253
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.es-en.html?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.es-en.html?cvsroot=www&r1=1.66&r2=1.67
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.es.po?cvsroot=www&r1=1.172&r2=1.173
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.es-en.html?cvsroot=www&r1=1.10&r2=1.11
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es-en.html?cvsroot=www&r1=1.82&r2=1.83
http://web.cvs.savannah.gnu.org/viewcvs/www/server/mirror.es.html?cvsroot=www&r1=1.65&r2=1.66
http://web.cvs.savannah.gnu.org/viewcvs/www/server/sitemap.es.html?cvsroot=www&r1=1.277&r2=1.278
http://web.cvs.savannah.gnu.org/viewcvs/www/server/po/mirror.es-en.html?cvsroot=www&r1=1.50&r2=1.51
http://web.cvs.savannah.gnu.org/viewcvs/www/server/po/sitemap.es-en.html?cvsroot=www&r1=1.141&r2=1.142
Patches:
Index: graphics/graphics.es.html
===================================================================
RCS file: /web/www/www/graphics/graphics.es.html,v
retrieving revision 1.80
retrieving revision 1.81
diff -u -b -r1.80 -r1.81
--- graphics/graphics.es.html 4 Mar 2020 10:59:14 -0000 1.80
+++ graphics/graphics.es.html 26 Mar 2020 11:32:20 -0000 1.81
@@ -227,6 +227,15 @@
<tr style="display:none"><td></td></tr>
<!-- Dummy entry for xhtml validation.
-->
+<!--#if expr="$THEME = /^(gnuhead|)$/
+ && $TYPE = /^(svg|logo|)$/" -->
+<tr><td><a href="/graphics/gnu-smiling.html">
+ <img src="/graphics/icons/gnu-smiling.80.png"
+ alt=" [Cabeza de GNU sonriente] " /></a></td>
+ <td>Marzo de 2020: GNU sonriente<br />
+ <small>de Las</small></td></tr>
+<!--#endif
+-->
<!--#if expr="$THEME = /^(tux|gnu|)$/
&& $TYPE = /^(banner|)$/" -->
<tr><td><a href="/graphics/holiday_deliveries.html">
@@ -793,6 +802,15 @@
<!--#endif
-->
<!--#if expr="$THEME = /^(gnuhead|)$/
+ && $TYPE = /^(svg|logo|)$/" -->
+<tr><td><a href="/graphics/gnu-smiling.html">
+ <img src="/graphics/icons/gnu-smiling.80.png"
+ alt=" [Cabeza de GNU sonriente] " /></a></td>
+ <td>GNU sonriente<br />
+ <small>de Las</small></td></tr>
+<!--#endif
+-->
+<!--#if expr="$THEME = /^(gnuhead|)$/
&& $TYPE = /^(banner|)$/" -->
<tr><td><a href="/graphics/gnubanner.html">
<img src="/graphics/icons/gnubanner-2.80.png"
@@ -1497,7 +1515,7 @@
<p class="unprintable"><!-- timestamp start -->
Ãltima actualización:
-$Date: 2020/03/04 10:59:14 $
+$Date: 2020/03/26 11:32:20 $
<!-- timestamp end -->
</p>
Index: graphics/po/graphics.es-en.html
===================================================================
RCS file: /web/www/www/graphics/po/graphics.es-en.html,v
retrieving revision 1.54
retrieving revision 1.55
diff -u -b -r1.54 -r1.55
--- graphics/po/graphics.es-en.html 4 Mar 2020 10:59:14 -0000 1.54
+++ graphics/po/graphics.es-en.html 26 Mar 2020 11:32:21 -0000 1.55
@@ -155,6 +155,13 @@
<table>
<tr style="display:none"><td></td></tr><!-- Dummy entry for xhtml validation.
+--><!--#if expr="$THEME = /^(gnuhead|)$/
+ && $TYPE = /^(svg|logo|)$/" -->
+<tr><td><a href="/graphics/gnu-smiling.html">
+ <img src="/graphics/icons/gnu-smiling.80.png"
+ alt=" [Smiling GNU head] " /></a></td>
+ <td>March 2020: GNU Smiling<br />
+ <small>by Las</small></td></tr><!--#endif
--><!--#if expr="$THEME = /^(tux|gnu|)$/
&& $TYPE = /^(banner|)$/" -->
<tr><td><a href="/graphics/holiday_deliveries.html">
@@ -595,6 +602,13 @@
<td>GNU/Linux Art<br />
<small>by Rui Damas</small></td></tr><!--#endif
--><!--#if expr="$THEME = /^(gnuhead|)$/
+ && $TYPE = /^(svg|logo|)$/" -->
+<tr><td><a href="/graphics/gnu-smiling.html">
+ <img src="/graphics/icons/gnu-smiling.80.png"
+ alt=" [Smiling GNU head] " /></a></td>
+ <td>GNU Smiling<br />
+ <small>by Las</small></td></tr><!--#endif
+--><!--#if expr="$THEME = /^(gnuhead|)$/
&& $TYPE = /^(banner|)$/" -->
<tr><td><a href="/graphics/gnubanner.html">
<img src="/graphics/icons/gnubanner-2.80.png"
@@ -1142,7 +1156,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/03/04 10:59:14 $
+$Date: 2020/03/26 11:32:21 $
<!-- timestamp end -->
</p>
</div>
Index: graphics/po/graphics.es.po
===================================================================
RCS file: /web/www/www/graphics/po/graphics.es.po,v
retrieving revision 1.142
retrieving revision 1.143
diff -u -b -r1.142 -r1.143
--- graphics/po/graphics.es.po 26 Mar 2020 11:09:31 -0000 1.142
+++ graphics/po/graphics.es.po 26 Mar 2020 11:32:21 -0000 1.143
@@ -231,8 +231,8 @@
" [Freedo stands in place of the 0 of 2019, and the gnu is holding the "
"9.] "
msgstr ""
-" [Freedo está en el lugar del 0 de 2019, y el ñu está sosteniendo el "
-"9.] "
+" [Freedo está en el lugar del 0 de 2019, y el ñu está sosteniendo el
9.]"
+" "
#. type: Content of: <table><tr><td>
msgid "September 2019: Happy GNU Year 2019!"
Index: proprietary/malware-appliances.es.html
===================================================================
RCS file: /web/www/www/proprietary/malware-appliances.es.html,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- proprietary/malware-appliances.es.html 25 Feb 2020 12:30:47 -0000
1.6
+++ proprietary/malware-appliances.es.html 26 Mar 2020 11:32:21 -0000
1.7
@@ -429,6 +429,15 @@
canadienses</a> a sus clientes.</p>
</li>
+ <li id="M201703070">
+ <p>La CIA aprovechó vulnerabilidades existentes en teléfonos y
televisores
+«inteligentes» para diseñar un software malicioso capaz de <a
+href="https://www.independent.co.uk/life-style/gadgets-and-tech/news/wikileaks-vault-7-android-iphone-cia-phones-handsets-tv-smart-julian-assange-a7616651.html">espiar
+mediante sus micrófonos y cámaras mientras parecÃan estar
+apagados</a>. Puesto que este software espÃa capta las señales, sortea el
+encriptado.</p>
+ </li>
+
<li id="M201702280">
<p>Los juguetes «CloudPets» con micrófono <a
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">revelan
@@ -982,7 +991,7 @@
<p class="unprintable"><!-- timestamp start -->
Ãltima actualización:
-$Date: 2020/02/25 12:30:47 $
+$Date: 2020/03/26 11:32:21 $
<!-- timestamp end -->
</p>
Index: proprietary/malware-mobiles.es.html
===================================================================
RCS file: /web/www/www/proprietary/malware-mobiles.es.html,v
retrieving revision 1.71
retrieving revision 1.72
diff -u -b -r1.71 -r1.72
--- proprietary/malware-mobiles.es.html 4 Mar 2020 10:59:15 -0000 1.71
+++ proprietary/malware-mobiles.es.html 26 Mar 2020 11:32:21 -0000 1.72
@@ -299,6 +299,15 @@
el <cite>firmware</cite> privativo de Broadcom.</p>
</li>
+ <li id="M201703070">
+ <p>La CIA aprovechó vulnerabilidades existentes en teléfonos y
televisores
+«inteligentes» para diseñar un software malicioso capaz de <a
+href="https://www.independent.co.uk/life-style/gadgets-and-tech/news/wikileaks-vault-7-android-iphone-cia-phones-handsets-tv-smart-julian-assange-a7616651.html">espiar
+mediante sus micrófonos y cámaras mientras parecÃan estar
+apagados</a>. Puesto que este software espÃa capta las señales, sortea el
+encriptado.</p>
+ </li>
+
<li id="M201702170">
<p>Las aplicaciones de los móviles para comunicarse <a
href="https://www.bleepingcomputer.com/news/security/millions-of-smart-cars-vulnerable-due-to-insecure-android-apps/">con
@@ -1302,7 +1311,7 @@
<p class="unprintable"><!-- timestamp start -->
Ãltima actualización:
-$Date: 2020/03/04 10:59:15 $
+$Date: 2020/03/26 11:32:21 $
<!-- timestamp end -->
</p>
Index: proprietary/proprietary-insecurity.es.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-insecurity.es.html,v
retrieving revision 1.12
retrieving revision 1.13
diff -u -b -r1.12 -r1.13
--- proprietary/proprietary-insecurity.es.html 25 Feb 2020 12:30:47 -0000
1.12
+++ proprietary/proprietary-insecurity.es.html 26 Mar 2020 11:32:21 -0000
1.13
@@ -340,6 +340,15 @@
poner en riesgo las vidas de cientos de personas.</p>
</li>
+ <li id="M201703070">
+ <p>La CIA aprovechó vulnerabilidades existentes en teléfonos y
televisores
+«inteligentes» para diseñar un software malicioso capaz de <a
+href="https://www.independent.co.uk/life-style/gadgets-and-tech/news/wikileaks-vault-7-android-iphone-cia-phones-handsets-tv-smart-julian-assange-a7616651.html">espiar
+mediante sus micrófonos y cámaras mientras parecÃan estar
+apagados</a>. Puesto que este software espÃa capta las señales, sortea el
+encriptado.</p>
+ </li>
+
<li id="M201702200">
<p>Si usted compra algo que supuestamente es «inteligente», como por
ejemplo un
automóvil, una casa, un televisor, un refrigerador, etc., por lo general <a
@@ -795,7 +804,7 @@
<p class="unprintable"><!-- timestamp start -->
Ãltima actualización:
-$Date: 2020/02/25 12:30:47 $
+$Date: 2020/03/26 11:32:21 $
<!-- timestamp end -->
</p>
Index: proprietary/proprietary.es.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary.es.html,v
retrieving revision 1.89
retrieving revision 1.90
diff -u -b -r1.89 -r1.90
--- proprietary/proprietary.es.html 4 Mar 2020 10:59:15 -0000 1.89
+++ proprietary/proprietary.es.html 26 Mar 2020 11:32:21 -0000 1.90
@@ -183,6 +183,15 @@
<h3 id="latest">Añadidos recientes</h3>
<ul class="blurbs">
+ <li id="M201703070">
+ <p>La CIA aprovechó vulnerabilidades existentes en teléfonos y
televisores
+«inteligentes» para diseñar un software malicioso capaz de <a
+href="https://www.independent.co.uk/life-style/gadgets-and-tech/news/wikileaks-vault-7-android-iphone-cia-phones-handsets-tv-smart-julian-assange-a7616651.html">espiar
+mediante sus micrófonos y cámaras mientras parecÃan estar
+apagados</a>. Puesto que este software espÃa capta las señales, sortea el
+encriptado.</p>
+ </li>
+
<li id="M202003010">
<p>La aplicación Health Code de Alipay estima si el usuario está
infectado por
el Covid-19 e <a
@@ -225,19 +234,6 @@
protegen un sistema privativo, en vez de eso están infectándolo con software
malicioso adicional (siendo el sistema mismo el primer software malicioso).</p>
</li>
-
- <li id="M202002020">
- <p>Muchas aplicaciones de Android engañan a los usuarios al pedirles que
-decidan qué permisos otorgar al programa, para a continuación <a
-href="https://nakedsecurity.sophos.com/2019/07/10/android-apps-sidestepping-permissions-to-access-sensitive-data/">ignorar
-sus preferencias</a>.</p>
-
- <p>Se supone que el sistema Android evita el filtrado de datos al ejecutar
las
-aplicaciones en entornos aislados, pero los desarrolladores han encontrado
-maneras de acceder a los datos por otros medios. Y no hay nada que el
-usuario pueda hacer para evitarlo, ya que tanto el sistema como las
-aplicaciones son privativas.</p>
- </li>
</ul>
</div>
@@ -317,7 +313,7 @@
<p class="unprintable"><!-- timestamp start -->
Ãltima actualización:
-$Date: 2020/03/04 10:59:15 $
+$Date: 2020/03/26 11:32:21 $
<!-- timestamp end -->
</p>
Index: proprietary/po/es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.252
retrieving revision 1.253
diff -u -b -r1.252 -r1.253
--- proprietary/po/es.po 25 Mar 2020 10:33:57 -0000 1.252
+++ proprietary/po/es.po 26 Mar 2020 11:32:21 -0000 1.253
@@ -3117,6 +3117,13 @@
"microphones and cameras while making them appear to be turned off</a>. Since "
"the spyware sniffs signals, it bypasses encryption."
msgstr ""
+"La CIA aprovechó vulnerabilidades existentes en teléfonos y televisores "
+"«inteligentes» para diseñar un software malicioso capaz de <a
href=\"https://"
+"www.independent.co.uk/life-style/gadgets-and-tech/news/wikileaks-vault-7-"
+"android-iphone-cia-phones-handsets-tv-smart-julian-assange-a7616651.html"
+"\">espiar mediante sus micrófonos y cámaras mientras parecÃan estar "
+"apagados</a>. Puesto que este software espÃa capta las señales, sortea el "
+"encriptado."
#. type: Content of: <div><ul><li><p>
msgid ""
Index: proprietary/po/malware-appliances.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.es-en.html,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- proprietary/po/malware-appliances.es-en.html 25 Feb 2020 12:30:47
-0000 1.6
+++ proprietary/po/malware-appliances.es-en.html 26 Mar 2020 11:32:21
-0000 1.7
@@ -423,6 +423,15 @@
customers.</p>
</li>
+ <li id="M201703070">
+ <p>The CIA exploited existing vulnerabilities
+ in “smart” TVs and phones to design a malware that <a
+
href="https://www.independent.co.uk/life-style/gadgets-and-tech/news/wikileaks-vault-7-android-iphone-cia-phones-handsets-tv-smart-julian-assange-a7616651.html">
+ spies through their microphones and cameras while making them appear
+ to be turned off</a>. Since the spyware sniffs signals, it bypasses
+ encryption.</p>
+ </li>
+
<li id="M201702280">
<p>“CloudPets” toys with microphones <a
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">
@@ -954,7 +963,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/02/25 12:30:47 $
+$Date: 2020/03/26 11:32:21 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/malware-mobiles.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.es-en.html,v
retrieving revision 1.66
retrieving revision 1.67
diff -u -b -r1.66 -r1.67
--- proprietary/po/malware-mobiles.es-en.html 4 Mar 2020 10:59:15 -0000
1.66
+++ proprietary/po/malware-mobiles.es-en.html 26 Mar 2020 11:32:21 -0000
1.67
@@ -279,6 +279,15 @@
Broadcom's non-free firmware.</p>
</li>
+ <li id="M201703070">
+ <p>The CIA exploited existing vulnerabilities
+ in “smart” TVs and phones to design a malware that <a
+
href="https://www.independent.co.uk/life-style/gadgets-and-tech/news/wikileaks-vault-7-android-iphone-cia-phones-handsets-tv-smart-julian-assange-a7616651.html">
+ spies through their microphones and cameras while making them appear
+ to be turned off</a>. Since the spyware sniffs signals, it bypasses
+ encryption.</p>
+ </li>
+
<li id="M201702170">
<p>The mobile apps for communicating <a
href="https://www.bleepingcomputer.com/news/security/millions-of-smart-cars-vulnerable-due-to-insecure-android-apps/">with
@@ -1232,7 +1241,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/03/04 10:59:15 $
+$Date: 2020/03/26 11:32:21 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/malware-mobiles.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.es.po,v
retrieving revision 1.172
retrieving revision 1.173
diff -u -b -r1.172 -r1.173
--- proprietary/po/malware-mobiles.es.po 26 Mar 2020 11:09:07 -0000
1.172
+++ proprietary/po/malware-mobiles.es.po 26 Mar 2020 11:32:21 -0000
1.173
@@ -1469,8 +1469,8 @@
#. type: Content of: <div><ul><li><p>
msgid ""
"<small>(Note that this article misuses the words “<a href=\"/"
-"philosophy/free-sw.html\">free software</a>” referring to zero "
-"price.)</small>"
+"philosophy/free-sw.html\">free software</a>” referring to zero price.)"
+"</small>"
msgstr ""
"<small>(Advierta que este artÃculo emplea mal las palabras “<a
href=\"/"
"philosophy/free-sw.html\">software libre</a>” para referirse a "
Index: proprietary/po/proprietary-insecurity.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.es-en.html,v
retrieving revision 1.10
retrieving revision 1.11
diff -u -b -r1.10 -r1.11
--- proprietary/po/proprietary-insecurity.es-en.html 25 Feb 2020 12:30:47
-0000 1.10
+++ proprietary/po/proprietary-insecurity.es-en.html 26 Mar 2020 11:32:21
-0000 1.11
@@ -321,6 +321,15 @@
lives at risk.</p>
</li>
+ <li id="M201703070">
+ <p>The CIA exploited existing vulnerabilities
+ in “smart” TVs and phones to design a malware that <a
+
href="https://www.independent.co.uk/life-style/gadgets-and-tech/news/wikileaks-vault-7-android-iphone-cia-phones-handsets-tv-smart-julian-assange-a7616651.html">
+ spies through their microphones and cameras while making them appear
+ to be turned off</a>. Since the spyware sniffs signals, it bypasses
+ encryption.</p>
+ </li>
+
<li id="M201702200">
<p>If you buy a used “smart”
car, house, TV, refrigerator, etc., usually <a
@@ -750,7 +759,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/02/25 12:30:47 $
+$Date: 2020/03/26 11:32:21 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es-en.html,v
retrieving revision 1.82
retrieving revision 1.83
diff -u -b -r1.82 -r1.83
--- proprietary/po/proprietary.es-en.html 4 Mar 2020 10:59:15 -0000
1.82
+++ proprietary/po/proprietary.es-en.html 26 Mar 2020 11:32:22 -0000
1.83
@@ -173,6 +173,15 @@
<h3 id="latest">Latest additions</h3>
<ul class="blurbs">
+ <li id="M201703070">
+ <p>The CIA exploited existing vulnerabilities
+ in “smart” TVs and phones to design a malware that <a
+
href="https://www.independent.co.uk/life-style/gadgets-and-tech/news/wikileaks-vault-7-android-iphone-cia-phones-handsets-tv-smart-julian-assange-a7616651.html">
+ spies through their microphones and cameras while making them appear
+ to be turned off</a>. Since the spyware sniffs signals, it bypasses
+ encryption.</p>
+ </li>
+
<li id="M202003010">
<p>The Alipay Health Code app
estimates whether the user has Covid-19 and <a
@@ -215,18 +224,6 @@
to protect a proprietary system are, instead, infecting it with
additional malware (the system itself being the original malware).</p>
</li>
-
- <li id="M202002020">
- <p>Many Android apps fool their users by asking
- them to decide what permissions to give the program, and then <a
-
href="https://nakedsecurity.sophos.com/2019/07/10/android-apps-sidestepping-permissions-to-access-sensitive-data/">
- bypassing these permissions</a>.</p>
-
- <p>The Android system is supposed to prevent data leaks by running apps
- in isolated sandboxes, but developers have found ways to access the
- data by other means, and there is nothing the user can do to stop
- them from doing so, since both the system and the apps are nonfree.</p>
- </li>
</ul>
</div>
@@ -288,7 +285,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/03/04 10:59:15 $
+$Date: 2020/03/26 11:32:22 $
<!-- timestamp end -->
</p>
</div>
Index: server/mirror.es.html
===================================================================
RCS file: /web/www/www/server/mirror.es.html,v
retrieving revision 1.65
retrieving revision 1.66
diff -u -b -r1.65 -r1.66
--- server/mirror.es.html 8 Mar 2020 20:29:03 -0000 1.65
+++ server/mirror.es.html 26 Mar 2020 11:32:22 -0000 1.66
@@ -55,6 +55,7 @@
<p><tt>rsync://mirror.csclub.uwaterloo.ca/gnu/</tt> (Canadá)</p>
<p><tt>rsync://gnu.freemirror.org/gnu</tt> (Canadá)</p>
<p><tt>rsync://mirror2.evolution-host.com/gnu</tt> (Canadá)</p>
+<p><tt>rsync://mirrors.sarata.com/gnu/</tt> (Arizona, EE. UU.)</p>
<p><tt>rsync://mirror.keystealth.org/gnu/</tt> (California, EE. UU.)</p>
<p><tt>rsync://mirrors.ocf.berkeley.edu/gnu/</tt> (California,
EE. UU.)</p>
<p><tt>rsync://mirrors.syringanetworks.net/gnu/</tt> (Idaho, EE. UU.)</p>
@@ -170,6 +171,7 @@
<dl class="compact">
<dt>América del Norte</dt>
<dd><tt>rsync://ftp.gnu.org/alpha/</tt> (EE. UU. - sitio principal)</dd>
+<dd><tt>rsync://mirrors.sarata.com/gnu-alpha/</tt> (EE. UU. - Arizona)</dd>
<dd><tt>rsync://gnualpha.freemirror.org/gnualpha</tt> (Canadá)</dd>
<dt>América del Sur</dt>
@@ -318,7 +320,7 @@
<p class="unprintable"><!-- timestamp start -->
Ãltima actualización:
-$Date: 2020/03/08 20:29:03 $
+$Date: 2020/03/26 11:32:22 $
<!-- timestamp end -->
</p>
Index: server/sitemap.es.html
===================================================================
RCS file: /web/www/www/server/sitemap.es.html,v
retrieving revision 1.277
retrieving revision 1.278
diff -u -b -r1.277 -r1.278
--- server/sitemap.es.html 23 Mar 2020 17:02:11 -0000 1.277
+++ server/sitemap.es.html 26 Mar 2020 11:32:22 -0000 1.278
@@ -720,7 +720,7 @@
<dt><a href="/graphics/gnu-slash-linux.html">gnu-slash-linux.html</a></dt>
<dd>Diseños GNU/Linux</dd>
<dt><a href="/graphics/gnu-smiling.html">gnu-smiling.html</a></dt>
- <dd>GNU smiling</dd>
+ <dd>GNU sonriente</dd>
<dt><a href="/graphics/gnubanner.html">gnubanner.html</a></dt>
<dd>Anuncios GNU y enlace</dd>
<dt><a href="/graphics/gnuhornedlogo.html">gnuhornedlogo.html</a></dt>
@@ -2195,7 +2195,7 @@
<p class="unprintable"><!-- timestamp start -->
Ãltima actualización:
-$Date: 2020/03/23 17:02:11 $
+$Date: 2020/03/26 11:32:22 $
<!-- timestamp end -->
</p>
Index: server/po/mirror.es-en.html
===================================================================
RCS file: /web/www/www/server/po/mirror.es-en.html,v
retrieving revision 1.50
retrieving revision 1.51
diff -u -b -r1.50 -r1.51
--- server/po/mirror.es-en.html 8 Mar 2020 20:29:03 -0000 1.50
+++ server/po/mirror.es-en.html 26 Mar 2020 11:32:22 -0000 1.51
@@ -49,6 +49,7 @@
<p><tt>rsync://mirror.csclub.uwaterloo.ca/gnu/</tt> (Canada)</p>
<p><tt>rsync://gnu.freemirror.org/gnu</tt> (Canada)</p>
<p><tt>rsync://mirror2.evolution-host.com/gnu</tt> (Canada)</p>
+<p><tt>rsync://mirrors.sarata.com/gnu/</tt> (Arizona, USA)</p>
<p><tt>rsync://mirror.keystealth.org/gnu/</tt> (California, USA)</p>
<p><tt>rsync://mirrors.ocf.berkeley.edu/gnu/</tt> (California, USA)</p>
<p><tt>rsync://mirrors.syringanetworks.net/gnu/</tt> (Idaho, USA)</p>
@@ -163,6 +164,7 @@
<dl class="compact">
<dt>North America</dt>
<dd><tt>rsync://ftp.gnu.org/alpha/</tt> (USA - primary site)</dd>
+<dd><tt>rsync://mirrors.sarata.com/gnu-alpha/</tt> (USA - Arizona)</dd>
<dd><tt>rsync://gnualpha.freemirror.org/gnualpha</tt> (Canada)</dd>
<dt>South America</dt>
@@ -292,7 +294,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/03/08 20:29:03 $
+$Date: 2020/03/26 11:32:22 $
<!-- timestamp end -->
</p>
</div>
Index: server/po/sitemap.es-en.html
===================================================================
RCS file: /web/www/www/server/po/sitemap.es-en.html,v
retrieving revision 1.141
retrieving revision 1.142
diff -u -b -r1.141 -r1.142
--- server/po/sitemap.es-en.html 4 Mar 2020 10:59:15 -0000 1.141
+++ server/po/sitemap.es-en.html 26 Mar 2020 11:32:22 -0000 1.142
@@ -712,6 +712,8 @@
<dd>GNU/Linux logos</dd>
<dt><a href="/graphics/gnu-slash-linux.html">gnu-slash-linux.html</a></dt>
<dd>GNU/Linux Art</dd>
+ <dt><a href="/graphics/gnu-smiling.html">gnu-smiling.html</a></dt>
+ <dd>GNU smiling</dd>
<dt><a href="/graphics/gnubanner.html">gnubanner.html</a></dt>
<dd>GNU banners and link</dd>
<dt><a href="/graphics/gnuhornedlogo.html">gnuhornedlogo.html</a></dt>
@@ -2047,7 +2049,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/03/04 10:59:15 $
+$Date: 2020/03/26 11:32:22 $
<!-- timestamp end -->
</p>
</div>
[Prev in Thread] |
Current Thread |
[Next in Thread] |
- www graphics/graphics.es.html graphics/po/graph...,
GNUN <=