[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary/po malware-in-online-conferenci...
From: |
Javier Fdez. Retenaga |
Subject: |
www/proprietary/po malware-in-online-conferenci... |
Date: |
Sat, 17 Apr 2021 06:05:35 -0400 (EDT) |
CVSROOT: /web/www
Module name: www
Changes by: Javier Fdez. Retenaga <jfrtnaga> 21/04/17 06:05:35
Modified files:
proprietary/po : malware-in-online-conferencing.es.po
proprietary.es.po proprietary-insecurity.es.po
Log message:
Update.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-in-online-conferencing.es.po?cvsroot=www&r1=1.19&r2=1.20
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.430&r2=1.431
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.es.po?cvsroot=www&r1=1.80&r2=1.81
Patches:
Index: malware-in-online-conferencing.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-in-online-conferencing.es.po,v
retrieving revision 1.19
retrieving revision 1.20
diff -u -b -r1.19 -r1.20
--- malware-in-online-conferencing.es.po 16 Apr 2021 17:31:22 -0000
1.19
+++ malware-in-online-conferencing.es.po 17 Apr 2021 10:05:34 -0000
1.20
@@ -9,14 +9,13 @@
msgstr ""
"Project-Id-Version: malware-in-online-conferencing.html\n"
"POT-Creation-Date: 2021-04-16 17:25+0000\n"
-"PO-Revision-Date: 2021-03-09 19:19+0100\n"
+"PO-Revision-Date: 2021-04-17 12:02+0200\n"
"Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
"Language-Team: Spanish\n"
"Language: es\n"
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2021-04-16 17:25+0000\n"
"X-Generator: Poedit 2.2.1\n"
"Plural-Forms: nplurals=2; plural=(n != 1);\n"
@@ -106,6 +105,12 @@
"attack chain that caused an RCE on a target machine, and all without any "
"form of user interaction."
msgstr ""
+"Investigadores han descubierto en Zoom una vulnerabilidad de dÃa cero que <a
"
+"href=\"https://www.zdnet.com/article/critical-zoom-vulnerability-triggers-"
+"remote-code-execution-without-user-input/\">puede utilizarse para lanzar "
+"ataques de ejecución remota de código (RCE)</a>. Los investigadores "
+"efectuaron una cadena de ataque de tres errores que ocasionó un RCE en la "
+"máquina objetivo, y todo ello sin ningún tipo de interacción del usuario."
#. type: Content of: <div><div><ul><li><p>
msgid ""
Index: proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.430
retrieving revision 1.431
diff -u -b -r1.430 -r1.431
--- proprietary.es.po 16 Apr 2021 17:31:25 -0000 1.430
+++ proprietary.es.po 17 Apr 2021 10:05:34 -0000 1.431
@@ -16,7 +16,6 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2021-04-15 18:55+0000\n"
"Plural-Forms: nplurals=2; plural=(n!=1);\n"
"X-Generator: Poedit 2.2.1\n"
@@ -349,22 +348,20 @@
"attack chain that caused an RCE on a target machine, and all without any "
"form of user interaction."
msgstr ""
+"Investigadores han descubierto en Zoom una vulnerabilidad de dÃa cero que <a
"
+"href=\"https://www.zdnet.com/article/critical-zoom-vulnerability-triggers-"
+"remote-code-execution-without-user-input/\">puede utilizarse para lanzar "
+"ataques de ejecución remota de código (RCE)</a>. Los investigadores "
+"efectuaron una cadena de ataque de tres errores que ocasionó un RCE en la "
+"máquina objetivo, y todo ello sin ningún tipo de interacción del usuario."
-#. type: Content of: <div><ul><li><p>
# | Google <a
# |
href=\"https://www.indiatoday.in/technology/news/story/disha-ravi-arrest-puts-privacy-of-all-google-india-users-in-doubt-1769772-2021-02-16\">handed
# | over personal data of Indian protesters and activists to Indian police</a>
# | which [-leaded-] {+led+} to their arrest. The cops requested the IP
# | address and the location where a document was created and with that
# | information, they identified protesters and activists.
-#, fuzzy
-#| msgid ""
-#| "Google <a href=\"https://www.indiatoday.in/technology/news/story/disha-"
-#| "ravi-arrest-puts-privacy-of-all-google-india-users-in-"
-#| "doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
-#| "and activists to Indian police</a> which leaded to their arrest. The cops "
-#| "requested the IP address and the location where a document was created "
-#| "and with that information, they identified protesters and activists."
+#. type: Content of: <div><ul><li><p>
msgid ""
"Google <a href=\"https://www.indiatoday.in/technology/news/story/disha-ravi-"
"arrest-puts-privacy-of-all-google-india-users-in-"
@@ -543,23 +540,3 @@
#. type: Content of: <div><p>
msgid "Updated:"
msgstr "Ãltima actualización:"
-
-#~ msgid ""
-#~ "TV manufacturers are turning to produce only “Smart” TV sets "
-#~ "(which include spyware) that <a href=\"https://frame.work/blog/in-defense-"
-#~ "of-dumb-tvs\">it's now very hard to find a TV that doesn't spy on you</a>."
-#~ msgstr ""
-#~ "Los fabricantes de televisores están empezando a fabricar únicamente "
-#~ "televisores «<cite>smart</cite>» (que contienen software espÃa). <a
href="
-#~ "\"https://frame.work/blog/in-defense-of-dumb-tvs\">Ahora es muy difÃcil "
-#~ "encontrar una aparato de televisión que no nos espÃe</a>."
-
-#~ msgid ""
-#~ "It appears that those manufacturers business model is not to produce TV "
-#~ "and sell them for money, but to collect your personal data and (possibly) "
-#~ "hand over them to others for benefit."
-#~ msgstr ""
-#~ "Da la impresión de que el modelo de negocio de estos fabricantes no es "
-#~ "producir televisores y venderlos por un precio, sino recopilar nuestros "
-#~ "datos personales y (probablemente) obtener beneficio cediéndoselos a "
-#~ "terceros."
Index: proprietary-insecurity.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.es.po,v
retrieving revision 1.80
retrieving revision 1.81
diff -u -b -r1.80 -r1.81
--- proprietary-insecurity.es.po 16 Apr 2021 17:31:23 -0000 1.80
+++ proprietary-insecurity.es.po 17 Apr 2021 10:05:35 -0000 1.81
@@ -16,7 +16,6 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2021-04-16 17:25+0000\n"
"X-Generator: Poedit 2.2.1\n"
#. type: Content of: <title>
@@ -133,6 +132,12 @@
"attack chain that caused an RCE on a target machine, and all without any "
"form of user interaction."
msgstr ""
+"Investigadores han descubierto en Zoom una vulnerabilidad de dÃa cero que <a
"
+"href=\"https://www.zdnet.com/article/critical-zoom-vulnerability-triggers-"
+"remote-code-execution-without-user-input/\">puede utilizarse para lanzar "
+"ataques de ejecución remota de código (RCE)</a>. Los investigadores "
+"efectuaron una cadena de ataque de tres errores que ocasionó un RCE en la "
+"máquina objetivo, y todo ello sin ningún tipo de interacción del usuario."
#. type: Content of: <div><div><ul><li><p>
msgid ""
[Prev in Thread] |
Current Thread |
[Next in Thread] |
- www/proprietary/po malware-in-online-conferenci...,
Javier Fdez. Retenaga <=