www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www graphics/graphics.es.html graphics/po/graph...


From: GNUN
Subject: www graphics/graphics.es.html graphics/po/graph...
Date: Thu, 26 Mar 2020 07:32:23 -0400 (EDT)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     20/03/26 07:32:23

Modified files:
        graphics       : graphics.es.html 
        graphics/po    : graphics.es-en.html graphics.es.po 
        proprietary    : malware-appliances.es.html 
                         malware-mobiles.es.html 
                         proprietary-insecurity.es.html 
                         proprietary.es.html 
        proprietary/po : es.po malware-appliances.es-en.html 
                         malware-mobiles.es-en.html 
                         malware-mobiles.es.po 
                         proprietary-insecurity.es-en.html 
                         proprietary.es-en.html 
        server         : mirror.es.html sitemap.es.html 
        server/po      : mirror.es-en.html sitemap.es-en.html 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/graphics/graphics.es.html?cvsroot=www&r1=1.80&r2=1.81
http://web.cvs.savannah.gnu.org/viewcvs/www/graphics/po/graphics.es-en.html?cvsroot=www&r1=1.54&r2=1.55
http://web.cvs.savannah.gnu.org/viewcvs/www/graphics/po/graphics.es.po?cvsroot=www&r1=1.142&r2=1.143
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-appliances.es.html?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-mobiles.es.html?cvsroot=www&r1=1.71&r2=1.72
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-insecurity.es.html?cvsroot=www&r1=1.12&r2=1.13
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary.es.html?cvsroot=www&r1=1.89&r2=1.90
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.252&r2=1.253
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.es-en.html?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.es-en.html?cvsroot=www&r1=1.66&r2=1.67
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.es.po?cvsroot=www&r1=1.172&r2=1.173
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.es-en.html?cvsroot=www&r1=1.10&r2=1.11
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es-en.html?cvsroot=www&r1=1.82&r2=1.83
http://web.cvs.savannah.gnu.org/viewcvs/www/server/mirror.es.html?cvsroot=www&r1=1.65&r2=1.66
http://web.cvs.savannah.gnu.org/viewcvs/www/server/sitemap.es.html?cvsroot=www&r1=1.277&r2=1.278
http://web.cvs.savannah.gnu.org/viewcvs/www/server/po/mirror.es-en.html?cvsroot=www&r1=1.50&r2=1.51
http://web.cvs.savannah.gnu.org/viewcvs/www/server/po/sitemap.es-en.html?cvsroot=www&r1=1.141&r2=1.142

Patches:
Index: graphics/graphics.es.html
===================================================================
RCS file: /web/www/www/graphics/graphics.es.html,v
retrieving revision 1.80
retrieving revision 1.81
diff -u -b -r1.80 -r1.81
--- graphics/graphics.es.html   4 Mar 2020 10:59:14 -0000       1.80
+++ graphics/graphics.es.html   26 Mar 2020 11:32:20 -0000      1.81
@@ -227,6 +227,15 @@
 <tr style="display:none"><td></td></tr>
 <!-- Dummy entry for xhtml validation.
 -->
+<!--#if expr="$THEME = /^(gnuhead|)$/
+              && $TYPE  = /^(svg|logo|)$/" -->
+<tr><td><a href="/graphics/gnu-smiling.html">
+    <img src="/graphics/icons/gnu-smiling.80.png"
+          alt="&nbsp;[Cabeza de GNU sonriente]&nbsp;" /></a></td>
+    <td>Marzo de 2020: GNU sonriente<br />
+    <small>de Las</small></td></tr>
+<!--#endif
+-->
 <!--#if expr="$THEME = /^(tux|gnu|)$/
               && $TYPE  = /^(banner|)$/" -->
 <tr><td><a href="/graphics/holiday_deliveries.html">
@@ -793,6 +802,15 @@
 <!--#endif
 -->
 <!--#if expr="$THEME = /^(gnuhead|)$/
+              && $TYPE  = /^(svg|logo|)$/" -->
+<tr><td><a href="/graphics/gnu-smiling.html">
+    <img src="/graphics/icons/gnu-smiling.80.png"
+          alt="&nbsp;[Cabeza de GNU sonriente]&nbsp;" /></a></td>
+    <td>GNU sonriente<br />
+    <small>de Las</small></td></tr>
+<!--#endif
+-->
+<!--#if expr="$THEME = /^(gnuhead|)$/
                && $TYPE  = /^(banner|)$/" -->
 <tr><td><a href="/graphics/gnubanner.html">
     <img src="/graphics/icons/gnubanner-2.80.png"
@@ -1497,7 +1515,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2020/03/04 10:59:14 $
+$Date: 2020/03/26 11:32:20 $
 
 <!-- timestamp end -->
 </p>

Index: graphics/po/graphics.es-en.html
===================================================================
RCS file: /web/www/www/graphics/po/graphics.es-en.html,v
retrieving revision 1.54
retrieving revision 1.55
diff -u -b -r1.54 -r1.55
--- graphics/po/graphics.es-en.html     4 Mar 2020 10:59:14 -0000       1.54
+++ graphics/po/graphics.es-en.html     26 Mar 2020 11:32:21 -0000      1.55
@@ -155,6 +155,13 @@
 
 <table>
 <tr style="display:none"><td></td></tr><!-- Dummy entry for xhtml validation.
+--><!--#if expr="$THEME = /^(gnuhead|)$/
+              && $TYPE  = /^(svg|logo|)$/" -->
+<tr><td><a href="/graphics/gnu-smiling.html">
+    <img src="/graphics/icons/gnu-smiling.80.png"
+          alt="&nbsp;[Smiling GNU head]&nbsp;" /></a></td>
+    <td>March 2020: GNU Smiling<br />
+    <small>by Las</small></td></tr><!--#endif
 --><!--#if expr="$THEME = /^(tux|gnu|)$/
               && $TYPE  = /^(banner|)$/" -->
 <tr><td><a href="/graphics/holiday_deliveries.html">
@@ -595,6 +602,13 @@
     <td>GNU/Linux Art<br />
     <small>by Rui Damas</small></td></tr><!--#endif
 --><!--#if expr="$THEME = /^(gnuhead|)$/
+              && $TYPE  = /^(svg|logo|)$/" -->
+<tr><td><a href="/graphics/gnu-smiling.html">
+    <img src="/graphics/icons/gnu-smiling.80.png"
+          alt="&nbsp;[Smiling GNU head]&nbsp;" /></a></td>
+    <td>GNU Smiling<br />
+    <small>by Las</small></td></tr><!--#endif
+--><!--#if expr="$THEME = /^(gnuhead|)$/
                && $TYPE  = /^(banner|)$/" -->
 <tr><td><a href="/graphics/gnubanner.html">
     <img src="/graphics/icons/gnubanner-2.80.png"
@@ -1142,7 +1156,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/03/04 10:59:14 $
+$Date: 2020/03/26 11:32:21 $
 <!-- timestamp end -->
 </p>
 </div>

Index: graphics/po/graphics.es.po
===================================================================
RCS file: /web/www/www/graphics/po/graphics.es.po,v
retrieving revision 1.142
retrieving revision 1.143
diff -u -b -r1.142 -r1.143
--- graphics/po/graphics.es.po  26 Mar 2020 11:09:31 -0000      1.142
+++ graphics/po/graphics.es.po  26 Mar 2020 11:32:21 -0000      1.143
@@ -231,8 +231,8 @@
 "&nbsp;[Freedo stands in place of the 0 of 2019, and the gnu is holding the "
 "9.]&nbsp;"
 msgstr ""
-"&nbsp;[Freedo está en el lugar del 0 de 2019, y el ñu está sosteniendo el "
-"9.]&nbsp;"
+"&nbsp;[Freedo está en el lugar del 0 de 2019, y el ñu está sosteniendo el 
9.]"
+"&nbsp;"
 
 #. type: Content of: <table><tr><td>
 msgid "September 2019: Happy GNU Year 2019!"

Index: proprietary/malware-appliances.es.html
===================================================================
RCS file: /web/www/www/proprietary/malware-appliances.es.html,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- proprietary/malware-appliances.es.html      25 Feb 2020 12:30:47 -0000      
1.6
+++ proprietary/malware-appliances.es.html      26 Mar 2020 11:32:21 -0000      
1.7
@@ -429,6 +429,15 @@
 canadienses</a> a sus clientes.</p>
   </li>
 
+  <li id="M201703070">
+    <p>La CIA aprovechó vulnerabilidades existentes en teléfonos y 
televisores
+«inteligentes» para diseñar un software malicioso capaz de <a
+href="https://www.independent.co.uk/life-style/gadgets-and-tech/news/wikileaks-vault-7-android-iphone-cia-phones-handsets-tv-smart-julian-assange-a7616651.html";>espiar
+mediante sus micrófonos y cámaras mientras parecían estar
+apagados</a>. Puesto que este software espía capta las señales, sortea el
+encriptado.</p>
+  </li>
+
   <li id="M201702280">
     <p>Los juguetes «CloudPets» con micrófono <a
 
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults";>revelan
@@ -982,7 +991,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2020/02/25 12:30:47 $
+$Date: 2020/03/26 11:32:21 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/malware-mobiles.es.html
===================================================================
RCS file: /web/www/www/proprietary/malware-mobiles.es.html,v
retrieving revision 1.71
retrieving revision 1.72
diff -u -b -r1.71 -r1.72
--- proprietary/malware-mobiles.es.html 4 Mar 2020 10:59:15 -0000       1.71
+++ proprietary/malware-mobiles.es.html 26 Mar 2020 11:32:21 -0000      1.72
@@ -299,6 +299,15 @@
 el <cite>firmware</cite> privativo de Broadcom.</p>
   </li>
 
+  <li id="M201703070">
+    <p>La CIA aprovechó vulnerabilidades existentes en teléfonos y 
televisores
+«inteligentes» para diseñar un software malicioso capaz de <a
+href="https://www.independent.co.uk/life-style/gadgets-and-tech/news/wikileaks-vault-7-android-iphone-cia-phones-handsets-tv-smart-julian-assange-a7616651.html";>espiar
+mediante sus micrófonos y cámaras mientras parecían estar
+apagados</a>. Puesto que este software espía capta las señales, sortea el
+encriptado.</p>
+  </li>
+
   <li id="M201702170">
     <p>Las aplicaciones de los móviles para comunicarse <a
 
href="https://www.bleepingcomputer.com/news/security/millions-of-smart-cars-vulnerable-due-to-insecure-android-apps/";>con
@@ -1302,7 +1311,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2020/03/04 10:59:15 $
+$Date: 2020/03/26 11:32:21 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary-insecurity.es.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-insecurity.es.html,v
retrieving revision 1.12
retrieving revision 1.13
diff -u -b -r1.12 -r1.13
--- proprietary/proprietary-insecurity.es.html  25 Feb 2020 12:30:47 -0000      
1.12
+++ proprietary/proprietary-insecurity.es.html  26 Mar 2020 11:32:21 -0000      
1.13
@@ -340,6 +340,15 @@
 poner en riesgo las vidas de cientos de personas.</p>
   </li>
 
+  <li id="M201703070">
+    <p>La CIA aprovechó vulnerabilidades existentes en teléfonos y 
televisores
+«inteligentes» para diseñar un software malicioso capaz de <a
+href="https://www.independent.co.uk/life-style/gadgets-and-tech/news/wikileaks-vault-7-android-iphone-cia-phones-handsets-tv-smart-julian-assange-a7616651.html";>espiar
+mediante sus micrófonos y cámaras mientras parecían estar
+apagados</a>. Puesto que este software espía capta las señales, sortea el
+encriptado.</p>
+  </li>
+
   <li id="M201702200">
     <p>Si usted compra algo que supuestamente es «inteligente», como por 
ejemplo un
 automóvil, una casa, un televisor, un refrigerador, etc., por lo general <a
@@ -795,7 +804,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2020/02/25 12:30:47 $
+$Date: 2020/03/26 11:32:21 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary.es.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary.es.html,v
retrieving revision 1.89
retrieving revision 1.90
diff -u -b -r1.89 -r1.90
--- proprietary/proprietary.es.html     4 Mar 2020 10:59:15 -0000       1.89
+++ proprietary/proprietary.es.html     26 Mar 2020 11:32:21 -0000      1.90
@@ -183,6 +183,15 @@
 <h3 id="latest">Añadidos recientes</h3>
 
 <ul class="blurbs">
+  <li id="M201703070">
+    <p>La CIA aprovechó vulnerabilidades existentes en teléfonos y 
televisores
+«inteligentes» para diseñar un software malicioso capaz de <a
+href="https://www.independent.co.uk/life-style/gadgets-and-tech/news/wikileaks-vault-7-android-iphone-cia-phones-handsets-tv-smart-julian-assange-a7616651.html";>espiar
+mediante sus micrófonos y cámaras mientras parecían estar
+apagados</a>. Puesto que este software espía capta las señales, sortea el
+encriptado.</p>
+  </li>
+
   <li id="M202003010">
     <p>La aplicación Health Code de Alipay estima si el usuario está 
infectado por
 el Covid-19 e <a
@@ -225,19 +234,6 @@
 protegen un sistema privativo, en vez de eso están infectándolo con software
 malicioso adicional (siendo el sistema mismo el primer software malicioso).</p>
   </li>
-
-  <li id="M202002020">
-    <p>Muchas aplicaciones de Android engañan a los usuarios al pedirles que
-decidan qué permisos otorgar al programa, para a continuación <a
-href="https://nakedsecurity.sophos.com/2019/07/10/android-apps-sidestepping-permissions-to-access-sensitive-data/";>ignorar
-sus preferencias</a>.</p>
-
-    <p>Se supone que el sistema Android evita el filtrado de datos al ejecutar 
las
-aplicaciones en entornos aislados, pero los desarrolladores han encontrado
-maneras de acceder a los datos por otros medios. Y no hay nada que el
-usuario pueda hacer para evitarlo, ya que tanto el sistema como las
-aplicaciones son privativas.</p>
-  </li>
 </ul>
 
 </div>
@@ -317,7 +313,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2020/03/04 10:59:15 $
+$Date: 2020/03/26 11:32:21 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/po/es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.252
retrieving revision 1.253
diff -u -b -r1.252 -r1.253
--- proprietary/po/es.po        25 Mar 2020 10:33:57 -0000      1.252
+++ proprietary/po/es.po        26 Mar 2020 11:32:21 -0000      1.253
@@ -3117,6 +3117,13 @@
 "microphones and cameras while making them appear to be turned off</a>. Since "
 "the spyware sniffs signals, it bypasses encryption."
 msgstr ""
+"La CIA aprovechó vulnerabilidades existentes en teléfonos y televisores "
+"«inteligentes» para diseñar un software malicioso capaz de <a 
href=\"https://";
+"www.independent.co.uk/life-style/gadgets-and-tech/news/wikileaks-vault-7-"
+"android-iphone-cia-phones-handsets-tv-smart-julian-assange-a7616651.html"
+"\">espiar mediante sus micrófonos y cámaras mientras parecían estar "
+"apagados</a>. Puesto que este software espía capta las señales, sortea el "
+"encriptado."
 
 #. type: Content of: <div><ul><li><p>
 msgid ""

Index: proprietary/po/malware-appliances.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.es-en.html,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- proprietary/po/malware-appliances.es-en.html        25 Feb 2020 12:30:47 
-0000      1.6
+++ proprietary/po/malware-appliances.es-en.html        26 Mar 2020 11:32:21 
-0000      1.7
@@ -423,6 +423,15 @@
     customers.</p>
   </li>
 
+  <li id="M201703070">
+    <p>The CIA exploited existing vulnerabilities
+    in &ldquo;smart&rdquo; TVs and phones to design a malware that <a
+    
href="https://www.independent.co.uk/life-style/gadgets-and-tech/news/wikileaks-vault-7-android-iphone-cia-phones-handsets-tv-smart-julian-assange-a7616651.html";>
+    spies through their microphones and cameras while making them appear
+    to be turned off</a>. Since the spyware sniffs signals, it bypasses
+    encryption.</p>
+  </li>
+
   <li id="M201702280">
     <p>&ldquo;CloudPets&rdquo; toys with microphones <a
     
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults";>
@@ -954,7 +963,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/02/25 12:30:47 $
+$Date: 2020/03/26 11:32:21 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/malware-mobiles.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.es-en.html,v
retrieving revision 1.66
retrieving revision 1.67
diff -u -b -r1.66 -r1.67
--- proprietary/po/malware-mobiles.es-en.html   4 Mar 2020 10:59:15 -0000       
1.66
+++ proprietary/po/malware-mobiles.es-en.html   26 Mar 2020 11:32:21 -0000      
1.67
@@ -279,6 +279,15 @@
     Broadcom's non-free firmware.</p>
   </li>
 
+  <li id="M201703070">
+    <p>The CIA exploited existing vulnerabilities
+    in &ldquo;smart&rdquo; TVs and phones to design a malware that <a
+    
href="https://www.independent.co.uk/life-style/gadgets-and-tech/news/wikileaks-vault-7-android-iphone-cia-phones-handsets-tv-smart-julian-assange-a7616651.html";>
+    spies through their microphones and cameras while making them appear
+    to be turned off</a>. Since the spyware sniffs signals, it bypasses
+    encryption.</p>
+  </li>
+
   <li id="M201702170">
     <p>The mobile apps for communicating <a
     
href="https://www.bleepingcomputer.com/news/security/millions-of-smart-cars-vulnerable-due-to-insecure-android-apps/";>with
@@ -1232,7 +1241,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/03/04 10:59:15 $
+$Date: 2020/03/26 11:32:21 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/malware-mobiles.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.es.po,v
retrieving revision 1.172
retrieving revision 1.173
diff -u -b -r1.172 -r1.173
--- proprietary/po/malware-mobiles.es.po        26 Mar 2020 11:09:07 -0000      
1.172
+++ proprietary/po/malware-mobiles.es.po        26 Mar 2020 11:32:21 -0000      
1.173
@@ -1469,8 +1469,8 @@
 #. type: Content of: <div><ul><li><p>
 msgid ""
 "<small>(Note that this article misuses the words &ldquo;<a href=\"/"
-"philosophy/free-sw.html\">free software</a>&rdquo; referring to zero "
-"price.)</small>"
+"philosophy/free-sw.html\">free software</a>&rdquo; referring to zero price.)"
+"</small>"
 msgstr ""
 "<small>(Advierta que este artículo emplea mal las palabras &ldquo;<a 
href=\"/"
 "philosophy/free-sw.html\">software libre</a>&rdquo; para referirse a "

Index: proprietary/po/proprietary-insecurity.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.es-en.html,v
retrieving revision 1.10
retrieving revision 1.11
diff -u -b -r1.10 -r1.11
--- proprietary/po/proprietary-insecurity.es-en.html    25 Feb 2020 12:30:47 
-0000      1.10
+++ proprietary/po/proprietary-insecurity.es-en.html    26 Mar 2020 11:32:21 
-0000      1.11
@@ -321,6 +321,15 @@
     lives at risk.</p>
   </li>
 
+  <li id="M201703070">
+    <p>The CIA exploited existing vulnerabilities
+    in &ldquo;smart&rdquo; TVs and phones to design a malware that <a
+    
href="https://www.independent.co.uk/life-style/gadgets-and-tech/news/wikileaks-vault-7-android-iphone-cia-phones-handsets-tv-smart-julian-assange-a7616651.html";>
+    spies through their microphones and cameras while making them appear
+    to be turned off</a>. Since the spyware sniffs signals, it bypasses
+    encryption.</p>
+  </li>
+
   <li id="M201702200">
     <p>If you buy a used &ldquo;smart&rdquo;
     car, house, TV, refrigerator, etc., usually <a
@@ -750,7 +759,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/02/25 12:30:47 $
+$Date: 2020/03/26 11:32:21 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es-en.html,v
retrieving revision 1.82
retrieving revision 1.83
diff -u -b -r1.82 -r1.83
--- proprietary/po/proprietary.es-en.html       4 Mar 2020 10:59:15 -0000       
1.82
+++ proprietary/po/proprietary.es-en.html       26 Mar 2020 11:32:22 -0000      
1.83
@@ -173,6 +173,15 @@
 <h3 id="latest">Latest additions</h3>
 
 <ul class="blurbs">
+  <li id="M201703070">
+    <p>The CIA exploited existing vulnerabilities
+    in &ldquo;smart&rdquo; TVs and phones to design a malware that <a
+    
href="https://www.independent.co.uk/life-style/gadgets-and-tech/news/wikileaks-vault-7-android-iphone-cia-phones-handsets-tv-smart-julian-assange-a7616651.html";>
+    spies through their microphones and cameras while making them appear
+    to be turned off</a>. Since the spyware sniffs signals, it bypasses
+    encryption.</p>
+  </li>
+
   <li id="M202003010">
     <p>The Alipay Health Code app
     estimates whether the user has Covid-19 and <a
@@ -215,18 +224,6 @@
     to protect a proprietary system are, instead, infecting it with
     additional malware (the system itself being the original malware).</p>
   </li>
-
-  <li id="M202002020">
-    <p>Many Android apps fool their users by asking
-    them to decide what permissions to give the program, and then <a
-    
href="https://nakedsecurity.sophos.com/2019/07/10/android-apps-sidestepping-permissions-to-access-sensitive-data/";>
-    bypassing these permissions</a>.</p>
-
-    <p>The Android system is supposed to prevent data leaks by running apps
-    in isolated sandboxes, but developers have found ways to access the
-    data by other means, and there is nothing the user can do to stop
-    them from doing so, since both the system and the apps are nonfree.</p>
-  </li>
 </ul>
 
 </div>
@@ -288,7 +285,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/03/04 10:59:15 $
+$Date: 2020/03/26 11:32:22 $
 <!-- timestamp end -->
 </p>
 </div>

Index: server/mirror.es.html
===================================================================
RCS file: /web/www/www/server/mirror.es.html,v
retrieving revision 1.65
retrieving revision 1.66
diff -u -b -r1.65 -r1.66
--- server/mirror.es.html       8 Mar 2020 20:29:03 -0000       1.65
+++ server/mirror.es.html       26 Mar 2020 11:32:22 -0000      1.66
@@ -55,6 +55,7 @@
 <p><tt>rsync://mirror.csclub.uwaterloo.ca/gnu/</tt> (Canadá)</p>
 <p><tt>rsync://gnu.freemirror.org/gnu</tt> (Canadá)</p>
 <p><tt>rsync://mirror2.evolution-host.com/gnu</tt> (Canadá)</p>
+<p><tt>rsync://mirrors.sarata.com/gnu/</tt> (Arizona, EE. UU.)</p>
 <p><tt>rsync://mirror.keystealth.org/gnu/</tt> (California, EE.&nbsp;UU.)</p>
 <p><tt>rsync://mirrors.ocf.berkeley.edu/gnu/</tt> (California, 
EE.&nbsp;UU.)</p>
 <p><tt>rsync://mirrors.syringanetworks.net/gnu/</tt> (Idaho, EE.&nbsp;UU.)</p>
@@ -170,6 +171,7 @@
 <dl class="compact">
 <dt>América del Norte</dt>
 <dd><tt>rsync://ftp.gnu.org/alpha/</tt> (EE.&nbsp;UU. - sitio principal)</dd>
+<dd><tt>rsync://mirrors.sarata.com/gnu-alpha/</tt> (EE. UU. - Arizona)</dd>
 <dd><tt>rsync://gnualpha.freemirror.org/gnualpha</tt> (Canadá)</dd>
 
 <dt>América del Sur</dt>
@@ -318,7 +320,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2020/03/08 20:29:03 $
+$Date: 2020/03/26 11:32:22 $
 
 <!-- timestamp end -->
 </p>

Index: server/sitemap.es.html
===================================================================
RCS file: /web/www/www/server/sitemap.es.html,v
retrieving revision 1.277
retrieving revision 1.278
diff -u -b -r1.277 -r1.278
--- server/sitemap.es.html      23 Mar 2020 17:02:11 -0000      1.277
+++ server/sitemap.es.html      26 Mar 2020 11:32:22 -0000      1.278
@@ -720,7 +720,7 @@
   <dt><a href="/graphics/gnu-slash-linux.html">gnu-slash-linux.html</a></dt>
   <dd>Diseños GNU/Linux</dd>
   <dt><a href="/graphics/gnu-smiling.html">gnu-smiling.html</a></dt>
-  <dd>GNU smiling</dd>
+  <dd>GNU sonriente</dd>
   <dt><a href="/graphics/gnubanner.html">gnubanner.html</a></dt>
   <dd>Anuncios GNU y enlace</dd>
   <dt><a href="/graphics/gnuhornedlogo.html">gnuhornedlogo.html</a></dt>
@@ -2195,7 +2195,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2020/03/23 17:02:11 $
+$Date: 2020/03/26 11:32:22 $
 
 <!-- timestamp end -->
 </p>

Index: server/po/mirror.es-en.html
===================================================================
RCS file: /web/www/www/server/po/mirror.es-en.html,v
retrieving revision 1.50
retrieving revision 1.51
diff -u -b -r1.50 -r1.51
--- server/po/mirror.es-en.html 8 Mar 2020 20:29:03 -0000       1.50
+++ server/po/mirror.es-en.html 26 Mar 2020 11:32:22 -0000      1.51
@@ -49,6 +49,7 @@
 <p><tt>rsync://mirror.csclub.uwaterloo.ca/gnu/</tt> (Canada)</p>
 <p><tt>rsync://gnu.freemirror.org/gnu</tt> (Canada)</p>
 <p><tt>rsync://mirror2.evolution-host.com/gnu</tt> (Canada)</p>
+<p><tt>rsync://mirrors.sarata.com/gnu/</tt> (Arizona, USA)</p>
 <p><tt>rsync://mirror.keystealth.org/gnu/</tt> (California, USA)</p>
 <p><tt>rsync://mirrors.ocf.berkeley.edu/gnu/</tt> (California, USA)</p>
 <p><tt>rsync://mirrors.syringanetworks.net/gnu/</tt> (Idaho, USA)</p>
@@ -163,6 +164,7 @@
 <dl class="compact">
 <dt>North America</dt>
 <dd><tt>rsync://ftp.gnu.org/alpha/</tt> (USA - primary site)</dd>
+<dd><tt>rsync://mirrors.sarata.com/gnu-alpha/</tt> (USA - Arizona)</dd>
 <dd><tt>rsync://gnualpha.freemirror.org/gnualpha</tt> (Canada)</dd>
 
 <dt>South America</dt>
@@ -292,7 +294,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/03/08 20:29:03 $
+$Date: 2020/03/26 11:32:22 $
 <!-- timestamp end -->
 </p>
 </div>

Index: server/po/sitemap.es-en.html
===================================================================
RCS file: /web/www/www/server/po/sitemap.es-en.html,v
retrieving revision 1.141
retrieving revision 1.142
diff -u -b -r1.141 -r1.142
--- server/po/sitemap.es-en.html        4 Mar 2020 10:59:15 -0000       1.141
+++ server/po/sitemap.es-en.html        26 Mar 2020 11:32:22 -0000      1.142
@@ -712,6 +712,8 @@
   <dd>GNU/Linux logos</dd>
   <dt><a href="/graphics/gnu-slash-linux.html">gnu-slash-linux.html</a></dt>
   <dd>GNU/Linux Art</dd>
+  <dt><a href="/graphics/gnu-smiling.html">gnu-smiling.html</a></dt>
+  <dd>GNU smiling</dd>
   <dt><a href="/graphics/gnubanner.html">gnubanner.html</a></dt>
   <dd>GNU banners and link</dd>
   <dt><a href="/graphics/gnuhornedlogo.html">gnuhornedlogo.html</a></dt>
@@ -2047,7 +2049,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/03/04 10:59:15 $
+$Date: 2020/03/26 11:32:22 $
 <!-- timestamp end -->
 </p>
 </div>



reply via email to

[Prev in Thread] Current Thread [Next in Thread]