www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary/po malware-in-online-conferenci...


From: Javier Fdez. Retenaga
Subject: www/proprietary/po malware-in-online-conferenci...
Date: Sat, 17 Apr 2021 06:05:35 -0400 (EDT)

CVSROOT:        /web/www
Module name:    www
Changes by:     Javier Fdez. Retenaga <jfrtnaga>        21/04/17 06:05:35

Modified files:
        proprietary/po : malware-in-online-conferencing.es.po 
                         proprietary.es.po proprietary-insecurity.es.po 

Log message:
        Update.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-in-online-conferencing.es.po?cvsroot=www&r1=1.19&r2=1.20
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.430&r2=1.431
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.es.po?cvsroot=www&r1=1.80&r2=1.81

Patches:
Index: malware-in-online-conferencing.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-in-online-conferencing.es.po,v
retrieving revision 1.19
retrieving revision 1.20
diff -u -b -r1.19 -r1.20
--- malware-in-online-conferencing.es.po        16 Apr 2021 17:31:22 -0000      
1.19
+++ malware-in-online-conferencing.es.po        17 Apr 2021 10:05:34 -0000      
1.20
@@ -9,14 +9,13 @@
 msgstr ""
 "Project-Id-Version: malware-in-online-conferencing.html\n"
 "POT-Creation-Date: 2021-04-16 17:25+0000\n"
-"PO-Revision-Date: 2021-03-09 19:19+0100\n"
+"PO-Revision-Date: 2021-04-17 12:02+0200\n"
 "Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
 "Language-Team: Spanish\n"
 "Language: es\n"
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2021-04-16 17:25+0000\n"
 "X-Generator: Poedit 2.2.1\n"
 "Plural-Forms: nplurals=2; plural=(n != 1);\n"
 
@@ -106,6 +105,12 @@
 "attack chain that caused an RCE on a target machine, and all without any "
 "form of user interaction."
 msgstr ""
+"Investigadores han descubierto en Zoom una vulnerabilidad de día cero que <a 
"
+"href=\"https://www.zdnet.com/article/critical-zoom-vulnerability-triggers-";
+"remote-code-execution-without-user-input/\">puede utilizarse para lanzar "
+"ataques de ejecución remota de código (RCE)</a>. Los investigadores "
+"efectuaron una cadena de ataque de tres errores que ocasionó un RCE en la "
+"máquina objetivo, y todo ello sin ningún tipo de interacción del usuario."
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""

Index: proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.430
retrieving revision 1.431
diff -u -b -r1.430 -r1.431
--- proprietary.es.po   16 Apr 2021 17:31:25 -0000      1.430
+++ proprietary.es.po   17 Apr 2021 10:05:34 -0000      1.431
@@ -16,7 +16,6 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2021-04-15 18:55+0000\n"
 "Plural-Forms: nplurals=2; plural=(n!=1);\n"
 "X-Generator: Poedit 2.2.1\n"
 
@@ -349,22 +348,20 @@
 "attack chain that caused an RCE on a target machine, and all without any "
 "form of user interaction."
 msgstr ""
+"Investigadores han descubierto en Zoom una vulnerabilidad de día cero que <a 
"
+"href=\"https://www.zdnet.com/article/critical-zoom-vulnerability-triggers-";
+"remote-code-execution-without-user-input/\">puede utilizarse para lanzar "
+"ataques de ejecución remota de código (RCE)</a>. Los investigadores "
+"efectuaron una cadena de ataque de tres errores que ocasionó un RCE en la "
+"máquina objetivo, y todo ello sin ningún tipo de interacción del usuario."
 
-#. type: Content of: <div><ul><li><p>
 # | Google <a
 # | 
href=\"https://www.indiatoday.in/technology/news/story/disha-ravi-arrest-puts-privacy-of-all-google-india-users-in-doubt-1769772-2021-02-16\";>handed
 # | over personal data of Indian protesters and activists to Indian police</a>
 # | which [-leaded-] {+led+} to their arrest. The cops requested the IP
 # | address and the location where a document was created and with that
 # | information, they identified protesters and activists.
-#, fuzzy
-#| msgid ""
-#| "Google <a href=\"https://www.indiatoday.in/technology/news/story/disha-";
-#| "ravi-arrest-puts-privacy-of-all-google-india-users-in-"
-#| "doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
-#| "and activists to Indian police</a> which leaded to their arrest. The cops "
-#| "requested the IP address and the location where a document was created "
-#| "and with that information, they identified protesters and activists."
+#. type: Content of: <div><ul><li><p>
 msgid ""
 "Google <a href=\"https://www.indiatoday.in/technology/news/story/disha-ravi-";
 "arrest-puts-privacy-of-all-google-india-users-in-"
@@ -543,23 +540,3 @@
 #. type: Content of: <div><p>
 msgid "Updated:"
 msgstr "Última actualización:"
-
-#~ msgid ""
-#~ "TV manufacturers are turning to produce only &ldquo;Smart&rdquo; TV sets "
-#~ "(which include spyware) that <a href=\"https://frame.work/blog/in-defense-";
-#~ "of-dumb-tvs\">it's now very hard to find a TV that doesn't spy on you</a>."
-#~ msgstr ""
-#~ "Los fabricantes de televisores están empezando a fabricar únicamente "
-#~ "televisores «<cite>smart</cite>» (que contienen software espía). <a 
href="
-#~ "\"https://frame.work/blog/in-defense-of-dumb-tvs\";>Ahora es muy difícil "
-#~ "encontrar una aparato de televisión que no nos espíe</a>."
-
-#~ msgid ""
-#~ "It appears that those manufacturers business model is not to produce TV "
-#~ "and sell them for money, but to collect your personal data and (possibly) "
-#~ "hand over them to others for benefit."
-#~ msgstr ""
-#~ "Da la impresión de que el modelo de negocio de estos fabricantes no es "
-#~ "producir televisores y venderlos por un precio, sino recopilar nuestros "
-#~ "datos personales y (probablemente) obtener beneficio cediéndoselos a "
-#~ "terceros."

Index: proprietary-insecurity.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.es.po,v
retrieving revision 1.80
retrieving revision 1.81
diff -u -b -r1.80 -r1.81
--- proprietary-insecurity.es.po        16 Apr 2021 17:31:23 -0000      1.80
+++ proprietary-insecurity.es.po        17 Apr 2021 10:05:35 -0000      1.81
@@ -16,7 +16,6 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2021-04-16 17:25+0000\n"
 "X-Generator: Poedit 2.2.1\n"
 
 #. type: Content of: <title>
@@ -133,6 +132,12 @@
 "attack chain that caused an RCE on a target machine, and all without any "
 "form of user interaction."
 msgstr ""
+"Investigadores han descubierto en Zoom una vulnerabilidad de día cero que <a 
"
+"href=\"https://www.zdnet.com/article/critical-zoom-vulnerability-triggers-";
+"remote-code-execution-without-user-input/\">puede utilizarse para lanzar "
+"ataques de ejecución remota de código (RCE)</a>. Los investigadores "
+"efectuaron una cadena de ataque de tres errores que ocasionó un RCE en la "
+"máquina objetivo, y todo ello sin ningún tipo de interacción del usuario."
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""



reply via email to

[Prev in Thread] Current Thread [Next in Thread]