[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary/po ru.po
From: |
GNUN |
Subject: |
www/proprietary/po ru.po |
Date: |
Fri, 7 May 2021 01:29:03 -0400 (EDT) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 21/05/07 01:29:03
Modified files:
proprietary/po : ru.po
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.647&r2=1.648
Patches:
Index: ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/ru.po,v
retrieving revision 1.647
retrieving revision 1.648
diff -u -b -r1.647 -r1.648
--- ru.po 7 May 2021 04:25:12 -0000 1.647
+++ ru.po 7 May 2021 05:29:03 -0000 1.648
@@ -107,20 +107,6 @@
"медвежÑими ÑÑлÑгами, коÑоÑÑе
подглÑдÑваÑÑ."
#. type: Content of: <div><ul><li><p>
-# | {+The+} <a
-# |
href=\"https://www.wired.com/story/weddings-social-media-apps-photos-memories-miscarriage-problem/\">WeddingWire
-# | app saves people's wedding photos forever and hands over data to
-# | others</a>, [-and gives people-] {+giving users+} no control over their
-# | personal information/data. The app also sometimes shows old photos and
-# | memories to [-the user-] {+users,+} without [-user having-] {+giving them
-# | any+} control over [-this.-] {+this either.+}
-#| msgid ""
-#| "<a href=\"https://www.wired.com/story/weddings-social-media-apps-photos-"
-#| "memories-miscarriage-problem/\">WeddingWire app saves people's wedding "
-#| "photos forever and hands over data to others</a>, and gives people no "
-#| "control over their personal information/data. The app also sometimes "
-#| "shows old photos and memories to the user without user having control "
-#| "over this."
msgid ""
"The <a href=\"https://www.wired.com/story/weddings-social-media-apps-photos-"
"memories-miscarriage-problem/\">WeddingWire app saves people's wedding "
@@ -137,19 +123,6 @@
"могÑÑ Ñ ÑÑим ÑделаÑÑ."
#. type: Content of: <div><ul><li><p>
-# | A zero-day vulnerability in Zoom which <a
-# |
href=\"https://www.zdnet.com/article/critical-zoom-vulnerability-triggers-remote-code-execution-without-user-input/\">can
-# | be used to launch remote code execution (RCE) attacks</a> has been
-# | disclosed by researchers. The researchers demonstrated a three-bug attack
-# | chain that caused an RCE on a target machine, [-and-] all {+this+} without
-# | any form of user interaction.
-#| msgid ""
-#| "A zero-day vulnerability in Zoom which <a href=\"https://www.zdnet.com/"
-#| "article/critical-zoom-vulnerability-triggers-remote-code-execution-"
-#| "without-user-input/\">can be used to launch remote code execution (RCE) "
-#| "attacks</a> has been disclosed by researchers. The researchers "
-#| "demonstrated a three-bug attack chain that caused an RCE on a target "
-#| "machine, and all without any form of user interaction."
msgid ""
"A zero-day vulnerability in Zoom which <a href=\"https://www.zdnet.com/"
"article/critical-zoom-vulnerability-triggers-remote-code-execution-without-"
- www/proprietary/po ru.po,
GNUN <=