www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary malware-amazon.es.html malware-...


From: GNUN
Subject: www/proprietary malware-amazon.es.html malware-...
Date: Sun, 6 Dec 2020 05:01:48 -0500 (EST)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     20/12/06 05:01:48

Modified files:
        proprietary    : malware-amazon.es.html 
                         malware-appliances.es.html 
                         malware-microsoft.es.html 
                         proprietary-insecurity.es.html 
                         proprietary-interference.es.html 
                         proprietary-sabotage.es.html 
        proprietary/po : malware-amazon.es-en.html 
                         malware-appliances.es-en.html 
                         malware-microsoft.es-en.html 
                         malware-microsoft.es.po 
                         proprietary-insecurity.es-en.html 
                         proprietary-interference.es-en.html 
                         proprietary-interference.es.po 
                         proprietary-sabotage.es-en.html 
                         proprietary-sabotage.es.po 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-amazon.es.html?cvsroot=www&r1=1.30&r2=1.31
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-appliances.es.html?cvsroot=www&r1=1.16&r2=1.17
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-microsoft.es.html?cvsroot=www&r1=1.85&r2=1.86
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-insecurity.es.html?cvsroot=www&r1=1.21&r2=1.22
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-interference.es.html?cvsroot=www&r1=1.12&r2=1.13
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-sabotage.es.html?cvsroot=www&r1=1.25&r2=1.26
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-amazon.es-en.html?cvsroot=www&r1=1.27&r2=1.28
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.es-en.html?cvsroot=www&r1=1.14&r2=1.15
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.es-en.html?cvsroot=www&r1=1.80&r2=1.81
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.es.po?cvsroot=www&r1=1.196&r2=1.197
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.es-en.html?cvsroot=www&r1=1.18&r2=1.19
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-interference.es-en.html?cvsroot=www&r1=1.11&r2=1.12
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-interference.es.po?cvsroot=www&r1=1.30&r2=1.31
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.es-en.html?cvsroot=www&r1=1.24&r2=1.25
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.es.po?cvsroot=www&r1=1.55&r2=1.56

Patches:
Index: malware-amazon.es.html
===================================================================
RCS file: /web/www/www/proprietary/malware-amazon.es.html,v
retrieving revision 1.30
retrieving revision 1.31
diff -u -b -r1.30 -r1.31
--- malware-amazon.es.html      24 Jun 2020 05:02:21 -0000      1.30
+++ malware-amazon.es.html      6 Dec 2020 10:01:47 -0000       1.31
@@ -244,7 +244,7 @@
   <li id="M201912170">
     <p>Algunos delincuentes informáticos (a los que equivocadamente se 
refieren en
 este artículo como <a
-href="https://www.gnu.org/philosophy/words-to-avoid.html#Hacker";><cite>«hackers»</cite></a>)
+href="/philosophy/words-to-avoid.html#Hacker"><cite>«hackers»</cite></a>)
 han conseguido entrar en el sistema privativo del Amazon Ring y <a
 
href="https://www.theguardian.com/technology/2019/dec/13/ring-hackers-reportedly-watching-talking-strangers-in-home-cameras";>acceder
 a la cámara, los altavoces y los micrófonos</a>.</p>
@@ -369,7 +369,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2020/06/24 05:02:21 $
+$Date: 2020/12/06 10:01:47 $
 
 <!-- timestamp end -->
 </p>

Index: malware-appliances.es.html
===================================================================
RCS file: /web/www/www/proprietary/malware-appliances.es.html,v
retrieving revision 1.16
retrieving revision 1.17
diff -u -b -r1.16 -r1.17
--- malware-appliances.es.html  17 Oct 2020 12:00:46 -0000      1.16
+++ malware-appliances.es.html  6 Dec 2020 10:01:47 -0000       1.17
@@ -123,7 +123,7 @@
   <li id="M201912170">
     <p>Algunos delincuentes informáticos (a los que equivocadamente se 
refieren en
 este artículo como <a
-href="https://www.gnu.org/philosophy/words-to-avoid.html#Hacker";><cite>«hackers»</cite></a>)
+href="/philosophy/words-to-avoid.html#Hacker"><cite>«hackers»</cite></a>)
 han conseguido entrar en el sistema privativo del Amazon Ring y <a
 
href="https://www.theguardian.com/technology/2019/dec/13/ring-hackers-reportedly-watching-talking-strangers-in-home-cameras";>acceder
 a la cámara, los altavoces y los micrófonos</a>.</p>
@@ -1063,7 +1063,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2020/10/17 12:00:46 $
+$Date: 2020/12/06 10:01:47 $
 
 <!-- timestamp end -->
 </p>

Index: malware-microsoft.es.html
===================================================================
RCS file: /web/www/www/proprietary/malware-microsoft.es.html,v
retrieving revision 1.85
retrieving revision 1.86
diff -u -b -r1.85 -r1.86
--- malware-microsoft.es.html   25 Nov 2020 11:29:41 -0000      1.85
+++ malware-microsoft.es.html   6 Dec 2020 10:01:47 -0000       1.86
@@ -316,7 +316,7 @@
 la fuerza un programa de «corrección»</a> en ordenadores con ciertas
 versiones de Windows 10. La corrección, tal como la entiende Microsoft,
 significa <a
-href="https://support.microsoft.com/en-us/help/4023057/update-reliability-for-windows-10-versions-1507-to-1909";>manipular
+href="https://support.microsoft.com/en-us/help/4023057/update-reliability";>manipular
 las Preferencias y archivos de los usuarios</a>, especialmente para
 «reparar» cualquier componente del sistema de actualización que los usuarios
 puedan haber desahabilitado intencionalmente, y así recuperar todo el
@@ -435,6 +435,16 @@
 <h3 id="surveillance">Vigilancia</h3>
 
 <ul class="blurbs">
+  <li id="M202011260">
+    <p>El conjunto de programas Office 365, de Microsoft, permite a los 
empleadores
+<a
+href="https://www.theguardian.com/technology/2020/nov/26/microsoft-productivity-score-feature-criticised-workplace-surveillance";>espiar
+a sus empleados</a>. Tras las protestas públicas, Microsoft ha declarado que
+<a
+href="https://www.theguardian.com/technology/2020/dec/02/microsoft-apologises-productivity-score-critics-derided-workplace-surveillance";>eliminaría
+esa funcionalidad</a>. Esperemos que así sea.</p>
+  </li>
+
   <li id="M202010221">
     <p>Microsoft impone su vigilancia en el juego Minecraft al <a
 
href="https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-mojang-java";>obligar
@@ -782,7 +792,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2020/11/25 11:29:41 $
+$Date: 2020/12/06 10:01:47 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary-insecurity.es.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-insecurity.es.html,v
retrieving revision 1.21
retrieving revision 1.22
diff -u -b -r1.21 -r1.22
--- proprietary-insecurity.es.html      27 Nov 2020 10:30:35 -0000      1.21
+++ proprietary-insecurity.es.html      6 Dec 2020 10:01:47 -0000       1.22
@@ -124,7 +124,7 @@
   <li id="M201912170">
     <p>Algunos delincuentes informáticos (a los que equivocadamente se 
refieren en
 este artículo como <a
-href="https://www.gnu.org/philosophy/words-to-avoid.html#Hacker";><cite>«hackers»</cite></a>)
+href="/philosophy/words-to-avoid.html#Hacker"><cite>«hackers»</cite></a>)
 han conseguido entrar en el sistema privativo del Amazon Ring y <a
 
href="https://www.theguardian.com/technology/2019/dec/13/ring-hackers-reportedly-watching-talking-strangers-in-home-cameras";>acceder
 a la cámara, los altavoces y los micrófonos</a>.</p>
@@ -849,7 +849,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2020/11/27 10:30:35 $
+$Date: 2020/12/06 10:01:47 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary-interference.es.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-interference.es.html,v
retrieving revision 1.12
retrieving revision 1.13
diff -u -b -r1.12 -r1.13
--- proprietary-interference.es.html    23 Nov 2020 14:35:43 -0000      1.12
+++ proprietary-interference.es.html    6 Dec 2020 10:01:47 -0000       1.13
@@ -103,7 +103,7 @@
   <li id="M201912170">
     <p>Algunos delincuentes informáticos (a los que equivocadamente se 
refieren en
 este artículo como <a
-href="https://www.gnu.org/philosophy/words-to-avoid.html#Hacker";><cite>«hackers»</cite></a>)
+href="/philosophy/words-to-avoid.html#Hacker"><cite>«hackers»</cite></a>)
 han conseguido entrar en el sistema privativo del Amazon Ring y <a
 
href="https://www.theguardian.com/technology/2019/dec/13/ring-hackers-reportedly-watching-talking-strangers-in-home-cameras";>acceder
 a la cámara, los altavoces y los micrófonos</a>.</p>
@@ -366,7 +366,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2020/11/23 14:35:43 $
+$Date: 2020/12/06 10:01:47 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary-sabotage.es.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-sabotage.es.html,v
retrieving revision 1.25
retrieving revision 1.26
diff -u -b -r1.25 -r1.26
--- proprietary-sabotage.es.html        27 Nov 2020 10:30:35 -0000      1.25
+++ proprietary-sabotage.es.html        6 Dec 2020 10:01:47 -0000       1.26
@@ -158,7 +158,7 @@
 la fuerza un programa de «corrección»</a> en ordenadores con ciertas
 versiones de Windows 10. La corrección, tal como la entiende Microsoft,
 significa <a
-href="https://support.microsoft.com/en-us/help/4023057/update-reliability-for-windows-10-versions-1507-to-1909";>manipular
+href="https://support.microsoft.com/en-us/help/4023057/update-reliability";>manipular
 las Preferencias y archivos de los usuarios</a>, especialmente para
 «reparar» cualquier componente del sistema de actualización que los usuarios
 puedan haber desahabilitado intencionalmente, y así recuperar todo el
@@ -746,7 +746,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2020/11/27 10:30:35 $
+$Date: 2020/12/06 10:01:47 $
 
 <!-- timestamp end -->
 </p>

Index: po/malware-amazon.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-amazon.es-en.html,v
retrieving revision 1.27
retrieving revision 1.28
diff -u -b -r1.27 -r1.28
--- po/malware-amazon.es-en.html        24 Jun 2020 05:37:09 -0000      1.27
+++ po/malware-amazon.es-en.html        6 Dec 2020 10:01:47 -0000       1.28
@@ -233,7 +233,7 @@
 <ul class="blurbs">
   <li id="M201912170">
     <p>Some security breakers (wrongly referred in this article as <a
-    
href="https://www.gnu.org/philosophy/words-to-avoid.html#Hacker";>&ldquo;hackers&rdquo;</a>)
+    href="/philosophy/words-to-avoid.html#Hacker">&ldquo;hackers&rdquo;</a>)
     managed to interfere the Amazon Ring proprietary system, and <a
     
href="https://www.theguardian.com/technology/2019/dec/13/ring-hackers-reportedly-watching-talking-strangers-in-home-cameras";>access
     its camera, speakers and microphones</a>.</p>
@@ -341,7 +341,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/06/24 05:37:09 $
+$Date: 2020/12/06 10:01:47 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/malware-appliances.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.es-en.html,v
retrieving revision 1.14
retrieving revision 1.15
diff -u -b -r1.14 -r1.15
--- po/malware-appliances.es-en.html    17 Oct 2020 12:00:46 -0000      1.14
+++ po/malware-appliances.es-en.html    6 Dec 2020 10:01:47 -0000       1.15
@@ -115,7 +115,7 @@
 
   <li id="M201912170">
     <p>Some security breakers (wrongly referred in this article as <a
-    
href="https://www.gnu.org/philosophy/words-to-avoid.html#Hacker";>&ldquo;hackers&rdquo;</a>)
+    href="/philosophy/words-to-avoid.html#Hacker">&ldquo;hackers&rdquo;</a>)
     managed to interfere the Amazon Ring proprietary system, and <a
     
href="https://www.theguardian.com/technology/2019/dec/13/ring-hackers-reportedly-watching-talking-strangers-in-home-cameras";>access
     its camera, speakers and microphones</a>.</p>
@@ -1037,7 +1037,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/10/17 12:00:46 $
+$Date: 2020/12/06 10:01:47 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/malware-microsoft.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.es-en.html,v
retrieving revision 1.80
retrieving revision 1.81
diff -u -b -r1.80 -r1.81
--- po/malware-microsoft.es-en.html     25 Nov 2020 11:29:42 -0000      1.80
+++ po/malware-microsoft.es-en.html     6 Dec 2020 10:01:47 -0000       1.81
@@ -302,7 +302,7 @@
     force-installing a &ldquo;remediation&rdquo;
     program</a> on computers running certain
     versions of Windows 10. Remediation, in Microsoft's view, means <a
-    
href="https://support.microsoft.com/en-us/help/4023057/update-reliability-for-windows-10-versions-1507-to-1909";>
+    href="https://support.microsoft.com/en-us/help/4023057/update-reliability";>
     tampering with users' settings and files</a>, notably to
     &ldquo;repair&rdquo; any components of the updating system that users
     may have intentionally disabled, and thus regain full power over
@@ -424,6 +424,15 @@
 <h3 id="surveillance">Surveillance</h3>
 
 <ul class="blurbs">
+  <li id="M202011260">
+    <p>Microsoft's Office 365 suite enables employers <a
+    
href="https://www.theguardian.com/technology/2020/nov/26/microsoft-productivity-score-feature-criticised-workplace-surveillance";>to
+    snoop on each employee</a>. After
+    a public outburst, Microsoft stated that <a
+    
href="https://www.theguardian.com/technology/2020/dec/02/microsoft-apologises-productivity-score-critics-derided-workplace-surveillance";>it
+    would remove this capability</a>. Let's hope so.</p>
+  </li>
+
   <li id="M202010221">
     <p>Microsoft is imposing its
     surveillance on the game of Minecraft by <a
@@ -745,7 +754,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/11/25 11:29:42 $
+$Date: 2020/12/06 10:01:47 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/malware-microsoft.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.es.po,v
retrieving revision 1.196
retrieving revision 1.197
diff -u -b -r1.196 -r1.197
--- po/malware-microsoft.es.po  6 Dec 2020 09:38:51 -0000       1.196
+++ po/malware-microsoft.es.po  6 Dec 2020 10:01:47 -0000       1.197
@@ -912,17 +912,17 @@
 "windows-diagnostic-data-in-your-organization#full-level\"> &ldquo;"
 "Full&rdquo; telemetry mode</a> allows Microsoft Windows engineers to access, "
 "among other things, registry keys <a href=\"https://docs.microsoft.com/en-us/";
-"previous-versions/windows/it-pro/windows-2000-server/"
-"cc939702(v=technet.10)\"> which can contain sensitive information like "
+"previous-versions/windows/it-pro/windows-2000-server/cc939702"
+"(v=technet.10)\"> which can contain sensitive information like "
 "administrator's login password</a>."
 msgstr ""
 "El <a href=\"https://docs.microsoft.com/en-us/windows/privacy/configure-";
 "windows-diagnostic-data-in-your-organization#full-level\">nivel de "
 "telemetría «Completo»</a> permite a los ingenieros de Microsoft acceder, "
 "entre otras cosas, a claves de registro <a href=\"https://docs.microsoft.com/";
-"en-us/previous-versions/windows/it-pro/windows-2000-server/"
-"cc939702(v=technet.10)\">que contienen información sensible, como la "
-"contraseña de inicio de sesión del administrador</a>."
+"en-us/previous-versions/windows/it-pro/windows-2000-server/cc939702"
+"(v=technet.10)\">que contienen información sensible, como la contraseña de "
+"inicio de sesión del administrador</a>."
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""

Index: po/proprietary-insecurity.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.es-en.html,v
retrieving revision 1.18
retrieving revision 1.19
diff -u -b -r1.18 -r1.19
--- po/proprietary-insecurity.es-en.html        27 Nov 2020 10:30:35 -0000      
1.18
+++ po/proprietary-insecurity.es-en.html        6 Dec 2020 10:01:47 -0000       
1.19
@@ -114,7 +114,7 @@
 
   <li id="M201912170">
     <p>Some security breakers (wrongly referred in this article as <a
-    
href="https://www.gnu.org/philosophy/words-to-avoid.html#Hacker";>&ldquo;hackers&rdquo;</a>)
+    href="/philosophy/words-to-avoid.html#Hacker">&ldquo;hackers&rdquo;</a>)
     managed to interfere the Amazon Ring proprietary system, and <a
     
href="https://www.theguardian.com/technology/2019/dec/13/ring-hackers-reportedly-watching-talking-strangers-in-home-cameras";>access
     its camera, speakers and microphones</a>.</p>
@@ -806,7 +806,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/11/27 10:30:35 $
+$Date: 2020/12/06 10:01:47 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/proprietary-interference.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-interference.es-en.html,v
retrieving revision 1.11
retrieving revision 1.12
diff -u -b -r1.11 -r1.12
--- po/proprietary-interference.es-en.html      23 Nov 2020 14:35:47 -0000      
1.11
+++ po/proprietary-interference.es-en.html      6 Dec 2020 10:01:47 -0000       
1.12
@@ -93,7 +93,7 @@
 
   <li id="M201912170">
     <p>Some security breakers (wrongly referred in this article as <a
-    
href="https://www.gnu.org/philosophy/words-to-avoid.html#Hacker";>&ldquo;hackers&rdquo;</a>)
+    href="/philosophy/words-to-avoid.html#Hacker">&ldquo;hackers&rdquo;</a>)
     managed to interfere the Amazon Ring proprietary system, and <a
     
href="https://www.theguardian.com/technology/2019/dec/13/ring-hackers-reportedly-watching-talking-strangers-in-home-cameras";>access
     its camera, speakers and microphones</a>.</p>
@@ -334,7 +334,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/11/23 14:35:47 $
+$Date: 2020/12/06 10:01:47 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/proprietary-interference.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-interference.es.po,v
retrieving revision 1.30
retrieving revision 1.31
diff -u -b -r1.30 -r1.31
--- po/proprietary-interference.es.po   6 Dec 2020 09:38:52 -0000       1.30
+++ po/proprietary-interference.es.po   6 Dec 2020 10:01:47 -0000       1.31
@@ -15,7 +15,6 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2020-11-30 12:25+0100\n"
 "Plural-Forms: nplurals=2; plural=(n!=1);\n"
 "X-Generator: Poedit 2.2.1\n"
 
@@ -147,12 +146,6 @@
 "arrancar el sistema a nivel del núcleo</a> en Windows. Es software inseguro "
 "que amplía la superficie de ataque del sistema operativo."
 
-# | Some security breakers (wrongly referred in this article as <a
-# | 
[-href=\"https://www.gnu.org/philosophy/words-to-avoid.html#Hacker\";>&ldquo;hackers&rdquo;</a>)-]
-# | 
{+href=\"/philosophy/words-to-avoid.html#Hacker\">&ldquo;hackers&rdquo;</a>)+}
-# |  managed to interfere the Amazon Ring proprietary system, and <a
-# | 
href=\"https://www.theguardian.com/technology/2019/dec/13/ring-hackers-reportedly-watching-talking-strangers-in-home-cameras\";>access
-# | its camera, speakers and microphones</a>.
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
 "Some security breakers (wrongly referred in this article as <a href=\"/"
@@ -276,8 +269,8 @@
 msgid ""
 "<small>(Note that the article refers to the infected software as &ldquo;"
 "content management system&rdquo;. A better term would be &ldquo;<a href=\"/"
-"philosophy/words-to-avoid.html#Content\">website revision system</"
-"a>&rdquo;.)</small>"
+"philosophy/words-to-avoid.html#Content\">website revision system</a>&rdquo;.)"
+"</small>"
 msgstr ""
 "<small>(Observe que el artículo se refiere al software infectado como "
 "«sistema de gestión de contenidos». Un término más correcto sería 
&ldquo;<a "

Index: po/proprietary-sabotage.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.es-en.html,v
retrieving revision 1.24
retrieving revision 1.25
diff -u -b -r1.24 -r1.25
--- po/proprietary-sabotage.es-en.html  27 Nov 2020 10:30:35 -0000      1.24
+++ po/proprietary-sabotage.es-en.html  6 Dec 2020 10:01:47 -0000       1.25
@@ -148,7 +148,7 @@
     force-installing a &ldquo;remediation&rdquo;
     program</a> on computers running certain
     versions of Windows 10. Remediation, in Microsoft's view, means <a
-    
href="https://support.microsoft.com/en-us/help/4023057/update-reliability-for-windows-10-versions-1507-to-1909";>
+    href="https://support.microsoft.com/en-us/help/4023057/update-reliability";>
     tampering with users' settings and files</a>, notably to
     &ldquo;repair&rdquo; any components of the updating system that users
     may have intentionally disabled, and thus regain full power over
@@ -711,7 +711,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/11/27 10:30:35 $
+$Date: 2020/12/06 10:01:47 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/proprietary-sabotage.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.es.po,v
retrieving revision 1.55
retrieving revision 1.56
diff -u -b -r1.55 -r1.56
--- po/proprietary-sabotage.es.po       6 Dec 2020 09:38:52 -0000       1.55
+++ po/proprietary-sabotage.es.po       6 Dec 2020 10:01:47 -0000       1.56
@@ -15,7 +15,6 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2020-12-05 11:26+0000\n"
 "Plural-Forms: nplurals=2; plural=(n!=1);\n"
 "X-Generator: Poedit 2.2.1\n"
 
@@ -239,20 +238,6 @@
 "dispositivos Apple del usuario para siempre</a>. No hay posibilidad de "
 "apelación."
 
-# | Microsoft has been <a
-# | 
href=\"https://borncity.com/win/2019/01/17/windows-10-update-kb4023057-re-released-1-16-2019/\";>
-# | force-installing a &ldquo;remediation&rdquo; program</a> on computers
-# | running certain versions of Windows 10. Remediation, in Microsoft's view,
-# | means <a
-# | 
[-href=\"https://support.microsoft.com/en-us/help/4023057/update-reliability-for-windows-10-versions-1507-to-1909\";>-]
-# | 
{+href=\"https://support.microsoft.com/en-us/help/4023057/update-reliability\";>+}
-# | tampering with users' settings and files</a>, notably to
-# | &ldquo;repair&rdquo; any components of the updating system that users may
-# | have intentionally disabled, and thus regain full power over them.
-# | Microsoft repeatedly pushed faulty versions of this program to users'
-# | machines, causing numerous problems, some of which <a
-# | 
href=\"https://www.windowsmode.com/microsoft-suspends-windows-10-october-2018-update-rollout-due-to-critical-bugs/\";>
-# | critical</a>.
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
 "Microsoft has been <a href=\"https://borncity.com/win/2019/01/17/windows-10-";



reply via email to

[Prev in Thread] Current Thread [Next in Thread]