www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary/po all.fr.po all.pot all.pt-br....


From: GNUN
Subject: www/proprietary/po all.fr.po all.pot all.pt-br....
Date: Thu, 15 Jul 2021 03:33:53 -0400 (EDT)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     21/07/15 03:33:52

Modified files:
        proprietary/po : all.fr.po all.pot all.pt-br.po all.ru.po de.po 
                         es.po fr.po it.po ja.po 
                         malware-microsoft.de-diff.html 
                         malware-microsoft.de.po malware-microsoft.es.po 
                         malware-microsoft.fr.po 
                         malware-microsoft.it-diff.html 
                         malware-microsoft.it.po 
                         malware-microsoft.ja-diff.html 
                         malware-microsoft.ja.po malware-microsoft.pot 
                         malware-microsoft.pt-br.po 
                         malware-microsoft.ru.po nl.po pl.po pot 
                         potential-malware.de-diff.html 
                         potential-malware.de.po potential-malware.es.po 
                         potential-malware.fr.po potential-malware.pot 
                         potential-malware.pt-br.po 
                         potential-malware.ru.po 
                         proprietary-censorship.de-diff.html 
                         proprietary-censorship.de.po 
                         proprietary-censorship.es.po 
                         proprietary-censorship.fr.po 
                         proprietary-censorship.it-diff.html 
                         proprietary-censorship.it.po 
                         proprietary-censorship.ja-diff.html 
                         proprietary-censorship.ja.po 
                         proprietary-censorship.pot 
                         proprietary-censorship.pt-br.po 
                         proprietary-censorship.ru.po 
                         proprietary-insecurity.de-diff.html 
                         proprietary-insecurity.de.po 
                         proprietary-insecurity.es.po 
                         proprietary-insecurity.fr.po 
                         proprietary-insecurity.it-diff.html 
                         proprietary-insecurity.it.po 
                         proprietary-insecurity.ja-diff.html 
                         proprietary-insecurity.ja.po 
                         proprietary-insecurity.pot 
                         proprietary-insecurity.pt-br.po 
                         proprietary-insecurity.ru.po 
                         proprietary-manipulation.es.po 
                         proprietary-manipulation.fr.po 
                         proprietary-manipulation.pot 
                         proprietary-manipulation.pt-br.po 
                         proprietary-manipulation.ru.po 
                         proprietary.de-diff.html proprietary.de.po 
                         proprietary.es.po proprietary.fr.po 
                         proprietary.it-diff.html proprietary.it.po 
                         proprietary.ja-diff.html proprietary.ja.po 
                         proprietary.nl-diff.html proprietary.nl.po 
                         proprietary.pl-diff.html proprietary.pl.po 
                         proprietary.pot proprietary.pt-br.po 
                         proprietary.ru.po proprietary.tr.po 
                         proprietary.zh-cn.po 
                         proprietary.zh-tw-diff.html 
                         proprietary.zh-tw.po pt-br.po ru.po tr.po 
                         zh-cn.po zh-tw.po 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/all.fr.po?cvsroot=www&r1=1.35&r2=1.36
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/all.pot?cvsroot=www&r1=1.18&r2=1.19
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/all.pt-br.po?cvsroot=www&r1=1.11&r2=1.12
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/all.ru.po?cvsroot=www&r1=1.34&r2=1.35
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.327&r2=1.328
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.469&r2=1.470
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.578&r2=1.579
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.327&r2=1.328
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.335&r2=1.336
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.de-diff.html?cvsroot=www&r1=1.83&r2=1.84
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.de.po?cvsroot=www&r1=1.173&r2=1.174
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.es.po?cvsroot=www&r1=1.231&r2=1.232
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.fr.po?cvsroot=www&r1=1.235&r2=1.236
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.it-diff.html?cvsroot=www&r1=1.80&r2=1.81
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.it.po?cvsroot=www&r1=1.178&r2=1.179
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.ja-diff.html?cvsroot=www&r1=1.95&r2=1.96
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.ja.po?cvsroot=www&r1=1.157&r2=1.158
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.pot?cvsroot=www&r1=1.115&r2=1.116
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.pt-br.po?cvsroot=www&r1=1.3&r2=1.4
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.ru.po?cvsroot=www&r1=1.268&r2=1.269
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.328&r2=1.329
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.327&r2=1.328
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.326&r2=1.327
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/potential-malware.de-diff.html?cvsroot=www&r1=1.17&r2=1.18
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/potential-malware.de.po?cvsroot=www&r1=1.19&r2=1.20
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/potential-malware.es.po?cvsroot=www&r1=1.15&r2=1.16
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/potential-malware.fr.po?cvsroot=www&r1=1.27&r2=1.28
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/potential-malware.pot?cvsroot=www&r1=1.15&r2=1.16
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/potential-malware.pt-br.po?cvsroot=www&r1=1.2&r2=1.3
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/potential-malware.ru.po?cvsroot=www&r1=1.33&r2=1.34
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-censorship.de-diff.html?cvsroot=www&r1=1.16&r2=1.17
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-censorship.de.po?cvsroot=www&r1=1.58&r2=1.59
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-censorship.es.po?cvsroot=www&r1=1.69&r2=1.70
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-censorship.fr.po?cvsroot=www&r1=1.67&r2=1.68
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-censorship.it-diff.html?cvsroot=www&r1=1.34&r2=1.35
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-censorship.it.po?cvsroot=www&r1=1.61&r2=1.62
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-censorship.ja-diff.html?cvsroot=www&r1=1.40&r2=1.41
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-censorship.ja.po?cvsroot=www&r1=1.48&r2=1.49
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-censorship.pot?cvsroot=www&r1=1.32&r2=1.33
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-censorship.pt-br.po?cvsroot=www&r1=1.1&r2=1.2
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-censorship.ru.po?cvsroot=www&r1=1.76&r2=1.77
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.de-diff.html?cvsroot=www&r1=1.82&r2=1.83
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.de.po?cvsroot=www&r1=1.180&r2=1.181
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.es.po?cvsroot=www&r1=1.110&r2=1.111
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.fr.po?cvsroot=www&r1=1.260&r2=1.261
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.it-diff.html?cvsroot=www&r1=1.95&r2=1.96
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.it.po?cvsroot=www&r1=1.197&r2=1.198
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ja-diff.html?cvsroot=www&r1=1.116&r2=1.117
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ja.po?cvsroot=www&r1=1.169&r2=1.170
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.pot?cvsroot=www&r1=1.135&r2=1.136
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.pt-br.po?cvsroot=www&r1=1.4&r2=1.5
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ru.po?cvsroot=www&r1=1.306&r2=1.307
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-manipulation.es.po?cvsroot=www&r1=1.36&r2=1.37
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-manipulation.fr.po?cvsroot=www&r1=1.33&r2=1.34
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-manipulation.pot?cvsroot=www&r1=1.18&r2=1.19
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-manipulation.pt-br.po?cvsroot=www&r1=1.4&r2=1.5
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-manipulation.ru.po?cvsroot=www&r1=1.26&r2=1.27
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de-diff.html?cvsroot=www&r1=1.285&r2=1.286
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de.po?cvsroot=www&r1=1.302&r2=1.303
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.487&r2=1.488
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr.po?cvsroot=www&r1=1.514&r2=1.515
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it-diff.html?cvsroot=www&r1=1.295&r2=1.296
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it.po?cvsroot=www&r1=1.311&r2=1.312
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja-diff.html?cvsroot=www&r1=1.300&r2=1.301
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja.po?cvsroot=www&r1=1.294&r2=1.295
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl-diff.html?cvsroot=www&r1=1.296&r2=1.297
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl.po?cvsroot=www&r1=1.285&r2=1.286
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl-diff.html?cvsroot=www&r1=1.312&r2=1.313
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl.po?cvsroot=www&r1=1.277&r2=1.278
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pot?cvsroot=www&r1=1.274&r2=1.275
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br.po?cvsroot=www&r1=1.437&r2=1.438
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.533&r2=1.534
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.tr.po?cvsroot=www&r1=1.181&r2=1.182
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-cn.po?cvsroot=www&r1=1.230&r2=1.231
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw-diff.html?cvsroot=www&r1=1.275&r2=1.276
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw.po?cvsroot=www&r1=1.264&r2=1.265
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.406&r2=1.407
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.685&r2=1.686
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/tr.po?cvsroot=www&r1=1.202&r2=1.203
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-cn.po?cvsroot=www&r1=1.203&r2=1.204
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.327&r2=1.328

Patches:
Index: all.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/all.fr.po,v
retrieving revision 1.35
retrieving revision 1.36
diff -u -b -r1.35 -r1.36
--- all.fr.po   15 Jul 2021 06:32:47 -0000      1.35
+++ all.fr.po   15 Jul 2021 07:33:48 -0000      1.36
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: all.html\n"
-"POT-Creation-Date: 2021-07-15 06:25+0000\n"
+"POT-Creation-Date: 2021-07-15 07:26+0000\n"
 "PO-Revision-Date: 2021-07-04 20:56+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <trad-gnu@april.org>\n"
@@ -81,7 +81,7 @@
 #. type: Content of: <div><ul><li><p>
 msgid ""
 "A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn.";
-"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\">can allow "
+"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
 "crackers to remotely gain access to the operating system</a> and install "
 "programs, view and delete data, or even create new user accounts with full "
 "user rights."
@@ -105,8 +105,8 @@
 #. type: Content of: <div><ul><li><p>
 msgid ""
 "<a href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-";
-"dream-incubation\">Advertising companies are experimenting to manipulate "
-"people's minds</a> and impose a new way of advertising by altering their "
+"dream-incubation\"> Advertising companies are experimenting to manipulate "
+"people's minds</a>, and impose a new way of advertising by altering their "
 "dreams. This &ldquo;targeted dream incubation&rdquo; would trigger &ldquo;"
 "refreshing dreams&rdquo; of the product, according to the companies."
 msgstr ""

Index: all.pot
===================================================================
RCS file: /web/www/www/proprietary/po/all.pot,v
retrieving revision 1.18
retrieving revision 1.19
diff -u -b -r1.18 -r1.19
--- all.pot     15 Jul 2021 06:32:47 -0000      1.18
+++ all.pot     15 Jul 2021 07:33:48 -0000      1.19
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: all.html\n"
-"POT-Creation-Date: 2021-07-15 06:25+0000\n"
+"POT-Creation-Date: 2021-07-15 07:26+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL@li.org>\n"
@@ -75,8 +75,8 @@
 #. type: Content of: <div><ul><li><p>
 msgid ""
 "A newly found Microsoft Windows vulnerability <a "
-"href=\"https://edition.cnn.com/2021/07/08/tech/microsoft-windows-10-printnightmare/\";>can
 "
-"allow crackers to remotely gain access to the operating system</a> and "
+"href=\"https://edition.cnn.com/2021/07/08/tech/microsoft-windows-10-printnightmare/\";>
 "
+"can allow crackers to remotely gain access to the operating system</a> and "
 "install programs, view and delete data, or even create new user accounts "
 "with full user rights."
 msgstr ""
@@ -97,11 +97,11 @@
 #. type: Content of: <div><ul><li><p>
 msgid ""
 "<a "
-"href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-dream-incubation\";>Advertising
 "
-"companies are experimenting to manipulate people's minds</a> and impose a "
-"new way of advertising by altering their dreams. This &ldquo;targeted dream "
-"incubation&rdquo; would trigger &ldquo;refreshing dreams&rdquo; of the "
-"product, according to the companies."
+"href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-dream-incubation\";>
 "
+"Advertising companies are experimenting to manipulate people's minds</a>, "
+"and impose a new way of advertising by altering their dreams. This "
+"&ldquo;targeted dream incubation&rdquo; would trigger &ldquo;refreshing "
+"dreams&rdquo; of the product, according to the companies."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>

Index: all.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/all.pt-br.po,v
retrieving revision 1.11
retrieving revision 1.12
diff -u -b -r1.11 -r1.12
--- all.pt-br.po        15 Jul 2021 06:32:47 -0000      1.11
+++ all.pt-br.po        15 Jul 2021 07:33:48 -0000      1.12
@@ -5,7 +5,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: all.html\n"
-"POT-Creation-Date: 2021-07-15 06:25+0000\n"
+"POT-Creation-Date: 2021-07-15 07:26+0000\n"
 "PO-Revision-Date: 2021-06-26 09:39-0300\n"
 "Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
 "Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -82,7 +82,7 @@
 #. type: Content of: <div><ul><li><p>
 msgid ""
 "A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn.";
-"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\">can allow "
+"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
 "crackers to remotely gain access to the operating system</a> and install "
 "programs, view and delete data, or even create new user accounts with full "
 "user rights."
@@ -107,8 +107,8 @@
 #. type: Content of: <div><ul><li><p>
 msgid ""
 "<a href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-";
-"dream-incubation\">Advertising companies are experimenting to manipulate "
-"people's minds</a> and impose a new way of advertising by altering their "
+"dream-incubation\"> Advertising companies are experimenting to manipulate "
+"people's minds</a>, and impose a new way of advertising by altering their "
 "dreams. This &ldquo;targeted dream incubation&rdquo; would trigger &ldquo;"
 "refreshing dreams&rdquo; of the product, according to the companies."
 msgstr ""

Index: all.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/all.ru.po,v
retrieving revision 1.34
retrieving revision 1.35
diff -u -b -r1.34 -r1.35
--- all.ru.po   15 Jul 2021 06:32:47 -0000      1.34
+++ all.ru.po   15 Jul 2021 07:33:48 -0000      1.35
@@ -9,7 +9,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: all.html\n"
-"POT-Creation-Date: 2021-07-15 06:25+0000\n"
+"POT-Creation-Date: 2021-07-15 07:26+0000\n"
 "PO-Revision-Date: 2021-04-27 13:06+0000\n"
 "Last-Translator: Ineiev <ineiev@gnu.org>\n"
 "Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -87,7 +87,7 @@
 #. type: Content of: <div><ul><li><p>
 msgid ""
 "A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn.";
-"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\">can allow "
+"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
 "crackers to remotely gain access to the operating system</a> and install "
 "programs, view and delete data, or even create new user accounts with full "
 "user rights."
@@ -112,8 +112,8 @@
 #. type: Content of: <div><ul><li><p>
 msgid ""
 "<a href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-";
-"dream-incubation\">Advertising companies are experimenting to manipulate "
-"people's minds</a> and impose a new way of advertising by altering their "
+"dream-incubation\"> Advertising companies are experimenting to manipulate "
+"people's minds</a>, and impose a new way of advertising by altering their "
 "dreams. This &ldquo;targeted dream incubation&rdquo; would trigger &ldquo;"
 "refreshing dreams&rdquo; of the product, according to the companies."
 msgstr ""

Index: de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.327
retrieving revision 1.328
diff -u -b -r1.327 -r1.328
--- de.po       15 Jul 2021 06:32:47 -0000      1.327
+++ de.po       15 Jul 2021 07:33:48 -0000      1.328
@@ -663,7 +663,7 @@
 #. type: Content of: <div><ul><li><p>
 msgid ""
 "A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn.";
-"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\">can allow "
+"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
 "crackers to remotely gain access to the operating system</a> and install "
 "programs, view and delete data, or even create new user accounts with full "
 "user rights."
@@ -697,8 +697,8 @@
 #. type: Content of: <div><ul><li><p>
 msgid ""
 "<a href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-";
-"dream-incubation\">Advertising companies are experimenting to manipulate "
-"people's minds</a> and impose a new way of advertising by altering their "
+"dream-incubation\"> Advertising companies are experimenting to manipulate "
+"people's minds</a>, and impose a new way of advertising by altering their "
 "dreams. This &ldquo;targeted dream incubation&rdquo; would trigger &ldquo;"
 "refreshing dreams&rdquo; of the product, according to the companies."
 msgstr ""
@@ -5386,10 +5386,9 @@
 # | [-Here are examples-]{+One kind+} of [-proprietary systems that impose-]
 # | {+malicious functionality is+} censorship o[-n-]{+f+} what [-their-] users
 # | can access.  {+Here are examples of programs which do this.+}  We have a
-# | <a [-href=\"/proprietary/proprietary-jails.html\">separate-]
-# | {+href=\"/proprietary/proprietary-jails.html#about-page\">separate+} list
-# | of proprietary systems that censor installation</a> of application
-# | programs (we call them [-&ldquo;jails&rdquo;.)-] {+&ldquo;jails&rdquo;).+}
+# | <a href=\"/proprietary/proprietary-jails.html\">separate list of
+# | proprietary systems that censor installation</a> of application programs
+# | (we call them [-&ldquo;jails&rdquo;.)-] {+&ldquo;jails&rdquo;).+}
 #, fuzzy
 #| msgid ""
 #| "Here are examples of proprietary systems that impose censorship on what "
@@ -5400,9 +5399,9 @@
 msgid ""
 "One kind of malicious functionality is censorship of what users can access.  "
 "Here are examples of programs which do this.  We have a <a href=\"/"
-"proprietary/proprietary-jails.html#about-page\">separate list of proprietary "
-"systems that censor installation</a> of application programs (we call them "
-"&ldquo;jails&rdquo;)."
+"proprietary/proprietary-jails.html\">separate list of proprietary systems "
+"that censor installation</a> of application programs (we call them &ldquo;"
+"jails&rdquo;)."
 msgstr ""
 "Hier nennen wir Beispiele von proprietären Systemen, die dem Zensur "
 "auferlegen, worauf Nutzer zugreifen können. Beachten Sie bitte auch das "
@@ -15078,6 +15077,27 @@
 
 #, fuzzy
 #~| msgid ""
+#~| "Here are examples of proprietary systems that impose censorship on what "
+#~| "their users can access. We have a <a href=\"/proprietary/proprietary-"
+#~| "jails.html\">separate list of proprietary systems that censor "
+#~| "installation</a> of application programs (we call them &ldquo;"
+#~| "jails&rdquo;.)"
+#~ msgid ""
+#~ "One kind of malicious functionality is censorship of what users can "
+#~ "access.  Here are examples of programs which do this.  We have a <a href="
+#~ "\"/proprietary/proprietary-jails.html#about-page\">separate list of "
+#~ "proprietary systems that censor installation</a> of application programs "
+#~ "(we call them &ldquo;jails&rdquo;)."
+#~ msgstr ""
+#~ "Hier nennen wir Beispiele von proprietären Systemen, die dem Zensur "
+#~ "auferlegen, worauf Nutzer zugreifen können. Beachten Sie bitte auch das "
+#~ "Dokument <cite><a href=\"/proprietary/proprietary-jails\">Proprietäre "
+#~ "Gefängnisse</a></cite>, einer Aufstellung proprietärer Systeme, die die "
+#~ "Installation von Anwenderprogrammen zensieren (wir nennen sie "
+#~ "<em>Gefängnisse</em>)."
+
+#, fuzzy
+#~| msgid ""
 #~| "As of April, 2017, the files in this directory list around 300 instances "
 #~| "of malicious functionalities, but there are surely thousands more we "
 #~| "don't know about."

Index: es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.469
retrieving revision 1.470
diff -u -b -r1.469 -r1.470
--- es.po       15 Jul 2021 06:32:47 -0000      1.469
+++ es.po       15 Jul 2021 07:33:48 -0000      1.470
@@ -603,7 +603,7 @@
 #. type: Content of: <div><ul><li><p>
 msgid ""
 "A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn.";
-"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\">can allow "
+"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
 "crackers to remotely gain access to the operating system</a> and install "
 "programs, view and delete data, or even create new user accounts with full "
 "user rights."
@@ -638,8 +638,8 @@
 #. type: Content of: <div><ul><li><p>
 msgid ""
 "<a href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-";
-"dream-incubation\">Advertising companies are experimenting to manipulate "
-"people's minds</a> and impose a new way of advertising by altering their "
+"dream-incubation\"> Advertising companies are experimenting to manipulate "
+"people's minds</a>, and impose a new way of advertising by altering their "
 "dreams. This &ldquo;targeted dream incubation&rdquo; would trigger &ldquo;"
 "refreshing dreams&rdquo; of the product, according to the companies."
 msgstr ""
@@ -7319,30 +7319,29 @@
 msgstr "Censura en el software privativo"
 
 #. type: Content of: <div><div><p>
-# | [-Here are examples-]{+One kind+} of [-proprietary systems that impose-]
-# | {+malicious functionality is+} censorship o[-n-]{+f+} what [-their-] users
-# | can access.  {+Here are examples of programs which do this.+}  We have a
-# | <a [-href=\"/proprietary/proprietary-jails.html\">separate-]
-# | {+href=\"/proprietary/proprietary-jails.html#about-page\">separate+} list
-# | of proprietary systems that censor installation</a> of application
-# | programs (we call them [-&ldquo;jails&rdquo;.)-] {+&ldquo;jails&rdquo;).+}
+# | One kind of malicious functionality is censorship of what users can
+# | access.  Here are examples of programs which do this.  We have a <a
+# | [-href=\"/proprietary/proprietary-jails.html#about-page\">separate-]
+# | {+href=\"/proprietary/proprietary-jails.html\">separate+} list of
+# | proprietary systems that censor installation</a> of application programs
+# | (we call them &ldquo;jails&rdquo;).
 #, fuzzy
 #| msgid ""
-#| "Here are examples of proprietary systems that impose censorship on what "
-#| "their users can access. We have a <a href=\"/proprietary/proprietary-"
-#| "jails.html\">separate list of proprietary systems that censor "
-#| "installation</a> of application programs (we call them &ldquo;"
-#| "jails&rdquo;.)"
+#| "One kind of malicious functionality is censorship of what users can "
+#| "access.  Here are examples of programs which do this.  We have a <a href="
+#| "\"/proprietary/proprietary-jails.html#about-page\">separate list of "
+#| "proprietary systems that censor installation</a> of application programs "
+#| "(we call them &ldquo;jails&rdquo;)."
 msgid ""
 "One kind of malicious functionality is censorship of what users can access.  "
 "Here are examples of programs which do this.  We have a <a href=\"/"
-"proprietary/proprietary-jails.html#about-page\">separate list of proprietary "
-"systems that censor installation</a> of application programs (we call them "
-"&ldquo;jails&rdquo;)."
-msgstr ""
-"Se presentan aquí ejemplos de sistemas privativos que imponen la censura "
-"bloqueando el acceso de los usuarios a algunas funciones. Tenemos también "
-"una <a href=\"/proprietary/proprietary-jails.html\">lista de sistemas "
+"proprietary/proprietary-jails.html\">separate list of proprietary systems "
+"that censor installation</a> of application programs (we call them &ldquo;"
+"jails&rdquo;)."
+msgstr ""
+"Un tipo de funcionalidad maliciosa es la que censura a qué pueden acceder "
+"los usuarios. Se presentan aquí ejemplos de programas que lo hacen. Tenemos "
+"además una <a href=\"/proprietary/proprietary-jails.html\">lista de sistemas 
"
 "privativos que censuran la instalación</a> de programas de aplicación (los "
 "llamamos «prisiones»)."
 
@@ -15913,6 +15912,26 @@
 
 #, fuzzy
 #~| msgid ""
+#~| "Here are examples of proprietary systems that impose censorship on what "
+#~| "their users can access. We have a <a href=\"/proprietary/proprietary-"
+#~| "jails.html\">separate list of proprietary systems that censor "
+#~| "installation</a> of application programs (we call them &ldquo;"
+#~| "jails&rdquo;.)"
+#~ msgid ""
+#~ "One kind of malicious functionality is censorship of what users can "
+#~ "access.  Here are examples of programs which do this.  We have a <a href="
+#~ "\"/proprietary/proprietary-jails.html#about-page\">separate list of "
+#~ "proprietary systems that censor installation</a> of application programs "
+#~ "(we call them &ldquo;jails&rdquo;)."
+#~ msgstr ""
+#~ "Se presentan aquí ejemplos de sistemas privativos que imponen la censura "
+#~ "bloqueando el acceso de los usuarios a algunas funciones. Tenemos también 
"
+#~ "una <a href=\"/proprietary/proprietary-jails.html\">lista de sistemas "
+#~ "privativos que censuran la instalación</a> de programas de aplicación "
+#~ "(los llamamos «prisiones»)."
+
+#, fuzzy
+#~| msgid ""
 #~| "As of March, 2021, the pages in this directory list around 500 instances "
 #~| "of malicious functionalities (with more than 590 references to back them "
 #~| "up), but there are surely thousands more we don't know about."

Index: fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.578
retrieving revision 1.579
diff -u -b -r1.578 -r1.579
--- fr.po       15 Jul 2021 06:32:48 -0000      1.578
+++ fr.po       15 Jul 2021 07:33:48 -0000      1.579
@@ -503,7 +503,7 @@
 #. type: Content of: <div><ul><li><p>
 msgid ""
 "A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn.";
-"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\">can allow "
+"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
 "crackers to remotely gain access to the operating system</a> and install "
 "programs, view and delete data, or even create new user accounts with full "
 "user rights."
@@ -527,8 +527,8 @@
 #. type: Content of: <div><ul><li><p>
 msgid ""
 "<a href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-";
-"dream-incubation\">Advertising companies are experimenting to manipulate "
-"people's minds</a> and impose a new way of advertising by altering their "
+"dream-incubation\"> Advertising companies are experimenting to manipulate "
+"people's minds</a>, and impose a new way of advertising by altering their "
 "dreams. This &ldquo;targeted dream incubation&rdquo; would trigger &ldquo;"
 "refreshing dreams&rdquo; of the product, according to the companies."
 msgstr ""
@@ -6100,12 +6100,25 @@
 msgstr "Censure par le logiciel privateur"
 
 #. type: Content of: <div><div><p>
+# | One kind of malicious functionality is censorship of what users can
+# | access.  Here are examples of programs which do this.  We have a <a
+# | [-href=\"/proprietary/proprietary-jails.html#about-page\">separate-]
+# | {+href=\"/proprietary/proprietary-jails.html\">separate+} list of
+# | proprietary systems that censor installation</a> of application programs
+# | (we call them &ldquo;jails&rdquo;).
+#, fuzzy
+#| msgid ""
+#| "One kind of malicious functionality is censorship of what users can "
+#| "access.  Here are examples of programs which do this.  We have a <a href="
+#| "\"/proprietary/proprietary-jails.html#about-page\">separate list of "
+#| "proprietary systems that censor installation</a> of application programs "
+#| "(we call them &ldquo;jails&rdquo;)."
 msgid ""
 "One kind of malicious functionality is censorship of what users can access.  "
 "Here are examples of programs which do this.  We have a <a href=\"/"
-"proprietary/proprietary-jails.html#about-page\">separate list of proprietary "
-"systems that censor installation</a> of application programs (we call them "
-"&ldquo;jails&rdquo;)."
+"proprietary/proprietary-jails.html\">separate list of proprietary systems "
+"that censor installation</a> of application programs (we call them &ldquo;"
+"jails&rdquo;)."
 msgstr ""
 "L'une de ces fonctionnalités malveillantes est de censurer les choses "
 "auxquelles leurs utilisateurs ont accès. Voici des exemples de programmes "
@@ -13495,6 +13508,19 @@
 msgstr "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
 
 #~ msgid ""
+#~ "One kind of malicious functionality is censorship of what users can "
+#~ "access.  Here are examples of programs which do this.  We have a <a href="
+#~ "\"/proprietary/proprietary-jails.html#about-page\">separate list of "
+#~ "proprietary systems that censor installation</a> of application programs "
+#~ "(we call them &ldquo;jails&rdquo;)."
+#~ msgstr ""
+#~ "L'une de ces fonctionnalités malveillantes est de censurer les choses "
+#~ "auxquelles leurs utilisateurs ont accès. Voici des exemples de programmes 
"
+#~ "qui le font. Nous avons une <a href=\"/proprietary/proprietary-jails.html"
+#~ "\">liste distincte des systèmes privateurs qui censurent l'installation</"
+#~ "a> d'applications (on les appelle les &ldquo;prisons&rdquo;.)"
+
+#~ msgid ""
 #~ "As of June, 2021, the pages in this directory list around 500 instances "
 #~ "of malicious functionalities (with more than 600 references to back them "
 #~ "up), but there are surely thousands more we don't know about."

Index: it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.327
retrieving revision 1.328
diff -u -b -r1.327 -r1.328
--- it.po       15 Jul 2021 06:32:48 -0000      1.327
+++ it.po       15 Jul 2021 07:33:49 -0000      1.328
@@ -629,7 +629,7 @@
 #. type: Content of: <div><ul><li><p>
 msgid ""
 "A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn.";
-"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\">can allow "
+"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
 "crackers to remotely gain access to the operating system</a> and install "
 "programs, view and delete data, or even create new user accounts with full "
 "user rights."
@@ -651,8 +651,8 @@
 #. type: Content of: <div><ul><li><p>
 msgid ""
 "<a href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-";
-"dream-incubation\">Advertising companies are experimenting to manipulate "
-"people's minds</a> and impose a new way of advertising by altering their "
+"dream-incubation\"> Advertising companies are experimenting to manipulate "
+"people's minds</a>, and impose a new way of advertising by altering their "
 "dreams. This &ldquo;targeted dream incubation&rdquo; would trigger &ldquo;"
 "refreshing dreams&rdquo; of the product, according to the companies."
 msgstr ""
@@ -5186,10 +5186,9 @@
 # | [-Here are examples-]{+One kind+} of [-proprietary systems that impose-]
 # | {+malicious functionality is+} censorship o[-n-]{+f+} what [-their-] users
 # | can access.  {+Here are examples of programs which do this.+}  We have a
-# | <a [-href=\"/proprietary/proprietary-jails.html\">separate-]
-# | {+href=\"/proprietary/proprietary-jails.html#about-page\">separate+} list
-# | of proprietary systems that censor installation</a> of application
-# | programs (we call them [-&ldquo;jails&rdquo;.)-] {+&ldquo;jails&rdquo;).+}
+# | <a href=\"/proprietary/proprietary-jails.html\">separate list of
+# | proprietary systems that censor installation</a> of application programs
+# | (we call them [-&ldquo;jails&rdquo;.)-] {+&ldquo;jails&rdquo;).+}
 #, fuzzy
 #| msgid ""
 #| "Here are examples of proprietary systems that impose censorship on what "
@@ -5200,9 +5199,9 @@
 msgid ""
 "One kind of malicious functionality is censorship of what users can access.  "
 "Here are examples of programs which do this.  We have a <a href=\"/"
-"proprietary/proprietary-jails.html#about-page\">separate list of proprietary "
-"systems that censor installation</a> of application programs (we call them "
-"&ldquo;jails&rdquo;)."
+"proprietary/proprietary-jails.html\">separate list of proprietary systems "
+"that censor installation</a> of application programs (we call them &ldquo;"
+"jails&rdquo;)."
 msgstr ""
 "Ecco alcuni esempi di sistemi proprietari che censurano il contenuto "
 "richiesto dai propri utenti. Rendiamo disponibile, separatamente, anche un "
@@ -14151,6 +14150,26 @@
 
 #, fuzzy
 #~| msgid ""
+#~| "Here are examples of proprietary systems that impose censorship on what "
+#~| "their users can access. We have a <a href=\"/proprietary/proprietary-"
+#~| "jails.html\">separate list of proprietary systems that censor "
+#~| "installation</a> of application programs (we call them &ldquo;"
+#~| "jails&rdquo;.)"
+#~ msgid ""
+#~ "One kind of malicious functionality is censorship of what users can "
+#~ "access.  Here are examples of programs which do this.  We have a <a href="
+#~ "\"/proprietary/proprietary-jails.html#about-page\">separate list of "
+#~ "proprietary systems that censor installation</a> of application programs "
+#~ "(we call them &ldquo;jails&rdquo;)."
+#~ msgstr ""
+#~ "Ecco alcuni esempi di sistemi proprietari che censurano il contenuto "
+#~ "richiesto dai propri utenti. Rendiamo disponibile, separatamente, anche "
+#~ "un <a href=\"/proprietary/proprietary-jails.html\">elenco di sistemi "
+#~ "proprietari che censurano l'installazione</a> di programmi (che chiamiamo "
+#~ "&ldquo;prigioni&rdquo;)."
+
+#, fuzzy
+#~| msgid ""
 #~| "As of April, 2017, the files in this directory list around 300 instances "
 #~| "of malicious functionalities, but there are surely thousands more we "
 #~| "don't know about."

Index: ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.335
retrieving revision 1.336
diff -u -b -r1.335 -r1.336
--- ja.po       15 Jul 2021 06:32:48 -0000      1.335
+++ ja.po       15 Jul 2021 07:33:49 -0000      1.336
@@ -472,7 +472,7 @@
 #. type: Content of: <div><ul><li><p>
 msgid ""
 "A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn.";
-"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\">can allow "
+"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
 "crackers to remotely gain access to the operating system</a> and install "
 "programs, view and delete data, or even create new user accounts with full "
 "user rights."
@@ -494,8 +494,8 @@
 #. type: Content of: <div><ul><li><p>
 msgid ""
 "<a href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-";
-"dream-incubation\">Advertising companies are experimenting to manipulate "
-"people's minds</a> and impose a new way of advertising by altering their "
+"dream-incubation\"> Advertising companies are experimenting to manipulate "
+"people's minds</a>, and impose a new way of advertising by altering their "
 "dreams. This &ldquo;targeted dream incubation&rdquo; would trigger &ldquo;"
 "refreshing dreams&rdquo; of the product, according to the companies."
 msgstr ""
@@ -4577,9 +4577,9 @@
 msgid ""
 "One kind of malicious functionality is censorship of what users can access.  "
 "Here are examples of programs which do this.  We have a <a href=\"/"
-"proprietary/proprietary-jails.html#about-page\">separate list of proprietary "
-"systems that censor installation</a> of application programs (we call them "
-"&ldquo;jails&rdquo;)."
+"proprietary/proprietary-jails.html\">separate list of proprietary systems "
+"that censor installation</a> of application programs (we call them &ldquo;"
+"jails&rdquo;)."
 msgstr ""
 
"こちらがユーザがアクセスできるものに対して検閲を強制するプロプライエタリのシ"
 "ステムの例です。アプリケーション・プログラムの<a 
href=\"/proprietary/"
@@ -11318,6 +11318,25 @@
 
 #, fuzzy
 #~| msgid ""
+#~| "Here are examples of proprietary systems that impose censorship on what "
+#~| "their users can access. We have a <a href=\"/proprietary/proprietary-"
+#~| "jails.html\">separate list of proprietary systems that censor "
+#~| "installation</a> of application programs (we call them &ldquo;"
+#~| "jails&rdquo;.)"
+#~ msgid ""
+#~ "One kind of malicious functionality is censorship of what users can "
+#~ "access.  Here are examples of programs which do this.  We have a <a href="
+#~ "\"/proprietary/proprietary-jails.html#about-page\">separate list of "
+#~ "proprietary systems that censor installation</a> of application programs "
+#~ "(we call them &ldquo;jails&rdquo;)."
+#~ msgstr ""
+#~ 
"こちらがユーザがアクセスできるものに対して検閲を強制するプロプライエタリの"
+#~ "システムの例です。アプリケーション・プログラムの<a 
href=\"/proprietary/"
+#~ 
"proprietary-jails.html\">インストレーションを検閲するプロプライエタリなシ"
+#~ "ステム
のリスト</a>(わたしたちはそれを「牢獄」と呼びます)は別にあります。"
+
+#, fuzzy
+#~| msgid ""
 #~| "As of January, 2017, the files in this directory list around 260 "
 #~| "instances of malicious functionalities, but there are surely thousands "
 #~| "more we don't know about."

Index: malware-microsoft.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.de-diff.html,v
retrieving revision 1.83
retrieving revision 1.84
diff -u -b -r1.83 -r1.84
--- malware-microsoft.de-diff.html      15 Jul 2021 06:32:48 -0000      1.83
+++ malware-microsoft.de-diff.html      15 Jul 2021 07:33:49 -0000      1.84
@@ -271,7 +271,11 @@
   &lt;li id="M202107090"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;A newly found Microsoft Windows vulnerability &lt;a 
href="https://edition.cnn.com/2021/07/08/tech/microsoft-windows-10-printnightmare/"&gt;can
 allow crackers to remotely gain access to the operating system&lt;/a&gt; and 
install programs, view and delete data, or even create new user accounts with 
full user rights.&lt;/p&gt;
+    &lt;p&gt;A newly found Microsoft Windows vulnerability &lt;a
+    
href="https://edition.cnn.com/2021/07/08/tech/microsoft-windows-10-printnightmare/"&gt;
+    can allow crackers to remotely gain access to the operating 
system&lt;/a&gt;
+    and install programs, view and delete data, or even create new user
+    accounts with full user rights.&lt;/p&gt;
 
     &lt;p&gt;The security research firm accidentally leaked instructions on
     how the flaw could be exploited but Windows users should still wait
@@ -1236,7 +1240,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/07/15 06:32:48 $
+$Date: 2021/07/15 07:33:49 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: malware-microsoft.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.de.po,v
retrieving revision 1.173
retrieving revision 1.174
diff -u -b -r1.173 -r1.174
--- malware-microsoft.de.po     15 Jul 2021 06:32:48 -0000      1.173
+++ malware-microsoft.de.po     15 Jul 2021 07:33:49 -0000      1.174
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: malware-microsoft.html\n"
 "Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2021-07-15 06:25+0000\n"
+"POT-Creation-Date: 2021-07-15 07:26+0000\n"
 "PO-Revision-Date: 2018-07-20 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <www-de-translators@gnu.org>\n"
@@ -468,7 +468,7 @@
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
 "A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn.";
-"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\">can allow "
+"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
 "crackers to remotely gain access to the operating system</a> and install "
 "programs, view and delete data, or even create new user accounts with full "
 "user rights."

Index: malware-microsoft.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.es.po,v
retrieving revision 1.231
retrieving revision 1.232
diff -u -b -r1.231 -r1.232
--- malware-microsoft.es.po     15 Jul 2021 06:32:48 -0000      1.231
+++ malware-microsoft.es.po     15 Jul 2021 07:33:49 -0000      1.232
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-microsoft.html\n"
-"POT-Creation-Date: 2021-07-15 06:25+0000\n"
+"POT-Creation-Date: 2021-07-15 07:26+0000\n"
 "PO-Revision-Date: \n"
 "Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
 "Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -341,7 +341,7 @@
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
 "A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn.";
-"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\">can allow "
+"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
 "crackers to remotely gain access to the operating system</a> and install "
 "programs, view and delete data, or even create new user accounts with full "
 "user rights."

Index: malware-microsoft.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.fr.po,v
retrieving revision 1.235
retrieving revision 1.236
diff -u -b -r1.235 -r1.236
--- malware-microsoft.fr.po     15 Jul 2021 06:32:48 -0000      1.235
+++ malware-microsoft.fr.po     15 Jul 2021 07:33:49 -0000      1.236
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-microsoft.html\n"
-"POT-Creation-Date: 2021-07-15 06:25+0000\n"
+"POT-Creation-Date: 2021-07-15 07:26+0000\n"
 "PO-Revision-Date: 2021-06-13 13:33+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <trad-gnu@april.org>\n"
@@ -337,7 +337,7 @@
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
 "A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn.";
-"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\">can allow "
+"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
 "crackers to remotely gain access to the operating system</a> and install "
 "programs, view and delete data, or even create new user accounts with full "
 "user rights."

Index: malware-microsoft.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.it-diff.html,v
retrieving revision 1.80
retrieving revision 1.81
diff -u -b -r1.80 -r1.81
--- malware-microsoft.it-diff.html      15 Jul 2021 06:32:48 -0000      1.80
+++ malware-microsoft.it-diff.html      15 Jul 2021 07:33:49 -0000      1.81
@@ -272,7 +272,11 @@
   &lt;li id="M202107090"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;A newly found Microsoft Windows vulnerability &lt;a 
href="https://edition.cnn.com/2021/07/08/tech/microsoft-windows-10-printnightmare/"&gt;can
 allow crackers to remotely gain access to the operating system&lt;/a&gt; and 
install programs, view and delete data, or even create new user accounts with 
full user rights.&lt;/p&gt;
+    &lt;p&gt;A newly found Microsoft Windows vulnerability &lt;a
+    
href="https://edition.cnn.com/2021/07/08/tech/microsoft-windows-10-printnightmare/"&gt;
+    can allow crackers to remotely gain access to the operating 
system&lt;/a&gt;
+    and install programs, view and delete data, or even create new user
+    accounts with full user rights.&lt;/p&gt;
 
     &lt;p&gt;The security research firm accidentally leaked instructions on
     how the flaw could be exploited but Windows users should still wait
@@ -733,7 +737,7 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;As</em></ins></span> of <span class="removed"><del><strong>the 
File Explorer&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>2019-2020, Minecraft players are &lt;a
     
href="https://www.minecraft.net/en-us/article/java-edition-moving-house"&gt;being
-    forced</em></ins></span> to <span 
class="removed"><del><strong>nag</strong></del></span> <span 
class="inserted"><ins><em>move to Microsoft servers&lt;/a&gt;, which results in
+    forced to move</em></ins></span> to <span 
class="removed"><del><strong>nag</strong></del></span> <span 
class="inserted"><ins><em>Microsoft servers&lt;/a&gt;, which results in
     privacy violation. Microsoft publishes a program so</em></ins></span> 
users <span class="inserted"><ins><em>can run
     their own server, but the program is proprietary and it's another &lt;a
     
href="/philosophy/free-software-even-more-important.html"&gt;injustice</em></ins></span>
@@ -1225,7 +1229,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/07/15 06:32:48 $
+$Date: 2021/07/15 07:33:49 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: malware-microsoft.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.it.po,v
retrieving revision 1.178
retrieving revision 1.179
diff -u -b -r1.178 -r1.179
--- malware-microsoft.it.po     15 Jul 2021 06:32:48 -0000      1.178
+++ malware-microsoft.it.po     15 Jul 2021 07:33:50 -0000      1.179
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-microsoft.html\n"
-"POT-Creation-Date: 2021-07-15 06:25+0000\n"
+"POT-Creation-Date: 2021-07-15 07:26+0000\n"
 "PO-Revision-Date: 2017-12-31 13:06+0100\n"
 "Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
 "Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -453,7 +453,7 @@
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
 "A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn.";
-"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\">can allow "
+"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
 "crackers to remotely gain access to the operating system</a> and install "
 "programs, view and delete data, or even create new user accounts with full "
 "user rights."

Index: malware-microsoft.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.ja-diff.html,v
retrieving revision 1.95
retrieving revision 1.96
diff -u -b -r1.95 -r1.96
--- malware-microsoft.ja-diff.html      15 Jul 2021 06:32:48 -0000      1.95
+++ malware-microsoft.ja-diff.html      15 Jul 2021 07:33:50 -0000      1.96
@@ -264,7 +264,11 @@
   &lt;li id="M202107090"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;A newly found Microsoft</em></ins></span> Windows <span 
class="removed"><del><strong>7</strong></del></span> <span 
class="inserted"><ins><em>vulnerability &lt;a 
href="https://edition.cnn.com/2021/07/08/tech/microsoft-windows-10-printnightmare/"&gt;can
 allow crackers to remotely gain access to the operating 
system&lt;/a&gt;</em></ins></span> and <span 
class="removed"><del><strong>8</strong></del></span> <span 
class="inserted"><ins><em>install programs, view and delete data, or even 
create new user accounts</em></ins></span> with <span 
class="removed"><del><strong>all-spying</strong></del></span> <span 
class="inserted"><ins><em>full user rights.&lt;/p&gt;
+    &lt;p&gt;A newly found Microsoft</em></ins></span> Windows <span 
class="removed"><del><strong>7</strong></del></span> <span 
class="inserted"><ins><em>vulnerability &lt;a
+    
href="https://edition.cnn.com/2021/07/08/tech/microsoft-windows-10-printnightmare/"&gt;
+    can allow crackers to remotely gain access to the operating 
system&lt;/a&gt;</em></ins></span>
+    and <span class="removed"><del><strong>8</strong></del></span> <span 
class="inserted"><ins><em>install programs, view and delete data, or even 
create new user
+    accounts</em></ins></span> with <span 
class="removed"><del><strong>all-spying</strong></del></span> <span 
class="inserted"><ins><em>full user rights.&lt;/p&gt;
 
     &lt;p&gt;The security research firm accidentally leaked instructions on
     how the flaw could be exploited but</em></ins></span> Windows <span 
class="removed"><del><strong>10&lt;/a&gt;.&lt;/p&gt;
@@ -1199,7 +1203,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/07/15 06:32:48 $
+$Date: 2021/07/15 07:33:50 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: malware-microsoft.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.ja.po,v
retrieving revision 1.157
retrieving revision 1.158
diff -u -b -r1.157 -r1.158
--- malware-microsoft.ja.po     15 Jul 2021 06:32:48 -0000      1.157
+++ malware-microsoft.ja.po     15 Jul 2021 07:33:50 -0000      1.158
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-microsoft.html\n"
-"POT-Creation-Date: 2021-07-15 06:25+0000\n"
+"POT-Creation-Date: 2021-07-15 07:26+0000\n"
 "PO-Revision-Date: 2016-12-20 14:57+0900\n"
 "Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
 "Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -366,7 +366,7 @@
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
 "A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn.";
-"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\">can allow "
+"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
 "crackers to remotely gain access to the operating system</a> and install "
 "programs, view and delete data, or even create new user accounts with full "
 "user rights."

Index: malware-microsoft.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.pot,v
retrieving revision 1.115
retrieving revision 1.116
diff -u -b -r1.115 -r1.116
--- malware-microsoft.pot       15 Jul 2021 06:32:48 -0000      1.115
+++ malware-microsoft.pot       15 Jul 2021 07:33:50 -0000      1.116
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-microsoft.html\n"
-"POT-Creation-Date: 2021-07-15 06:25+0000\n"
+"POT-Creation-Date: 2021-07-15 07:26+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL@li.org>\n"
@@ -255,8 +255,8 @@
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
 "A newly found Microsoft Windows vulnerability <a "
-"href=\"https://edition.cnn.com/2021/07/08/tech/microsoft-windows-10-printnightmare/\";>can
 "
-"allow crackers to remotely gain access to the operating system</a> and "
+"href=\"https://edition.cnn.com/2021/07/08/tech/microsoft-windows-10-printnightmare/\";>
 "
+"can allow crackers to remotely gain access to the operating system</a> and "
 "install programs, view and delete data, or even create new user accounts "
 "with full user rights."
 msgstr ""

Index: malware-microsoft.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.pt-br.po,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -b -r1.3 -r1.4
--- malware-microsoft.pt-br.po  15 Jul 2021 06:32:48 -0000      1.3
+++ malware-microsoft.pt-br.po  15 Jul 2021 07:33:50 -0000      1.4
@@ -5,7 +5,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-microsoft.html\n"
-"POT-Creation-Date: 2021-07-15 06:25+0000\n"
+"POT-Creation-Date: 2021-07-15 07:26+0000\n"
 "PO-Revision-Date: 2021-06-26 09:40-0300\n"
 "Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
 "Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -332,7 +332,7 @@
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
 "A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn.";
-"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\">can allow "
+"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
 "crackers to remotely gain access to the operating system</a> and install "
 "programs, view and delete data, or even create new user accounts with full "
 "user rights."

Index: malware-microsoft.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.ru.po,v
retrieving revision 1.268
retrieving revision 1.269
diff -u -b -r1.268 -r1.269
--- malware-microsoft.ru.po     15 Jul 2021 06:32:48 -0000      1.268
+++ malware-microsoft.ru.po     15 Jul 2021 07:33:50 -0000      1.269
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2021-07-15 06:25+0000\n"
+"POT-Creation-Date: 2021-07-15 07:26+0000\n"
 "PO-Revision-Date: 2020-05-25 16:59+0000\n"
 "Last-Translator: Ineiev <ineiev@gnu.org>\n"
 "Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -338,7 +338,7 @@
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
 "A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn.";
-"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\">can allow "
+"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
 "crackers to remotely gain access to the operating system</a> and install "
 "programs, view and delete data, or even create new user accounts with full "
 "user rights."

Index: nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.328
retrieving revision 1.329
diff -u -b -r1.328 -r1.329
--- nl.po       15 Jul 2021 06:32:48 -0000      1.328
+++ nl.po       15 Jul 2021 07:33:50 -0000      1.329
@@ -450,7 +450,7 @@
 #. type: Content of: <div><ul><li><p>
 msgid ""
 "A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn.";
-"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\">can allow "
+"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
 "crackers to remotely gain access to the operating system</a> and install "
 "programs, view and delete data, or even create new user accounts with full "
 "user rights."
@@ -472,8 +472,8 @@
 #. type: Content of: <div><ul><li><p>
 msgid ""
 "<a href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-";
-"dream-incubation\">Advertising companies are experimenting to manipulate "
-"people's minds</a> and impose a new way of advertising by altering their "
+"dream-incubation\"> Advertising companies are experimenting to manipulate "
+"people's minds</a>, and impose a new way of advertising by altering their "
 "dreams. This &ldquo;targeted dream incubation&rdquo; would trigger &ldquo;"
 "refreshing dreams&rdquo; of the product, according to the companies."
 msgstr ""
@@ -4363,9 +4363,9 @@
 msgid ""
 "One kind of malicious functionality is censorship of what users can access.  "
 "Here are examples of programs which do this.  We have a <a href=\"/"
-"proprietary/proprietary-jails.html#about-page\">separate list of proprietary "
-"systems that censor installation</a> of application programs (we call them "
-"&ldquo;jails&rdquo;)."
+"proprietary/proprietary-jails.html\">separate list of proprietary systems "
+"that censor installation</a> of application programs (we call them &ldquo;"
+"jails&rdquo;)."
 msgstr ""
 
 #. type: Content of: <div><div><p>

Index: pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.327
retrieving revision 1.328
diff -u -b -r1.327 -r1.328
--- pl.po       15 Jul 2021 06:32:48 -0000      1.327
+++ pl.po       15 Jul 2021 07:33:50 -0000      1.328
@@ -439,7 +439,7 @@
 #. type: Content of: <div><ul><li><p>
 msgid ""
 "A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn.";
-"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\">can allow "
+"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
 "crackers to remotely gain access to the operating system</a> and install "
 "programs, view and delete data, or even create new user accounts with full "
 "user rights."
@@ -461,8 +461,8 @@
 #. type: Content of: <div><ul><li><p>
 msgid ""
 "<a href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-";
-"dream-incubation\">Advertising companies are experimenting to manipulate "
-"people's minds</a> and impose a new way of advertising by altering their "
+"dream-incubation\"> Advertising companies are experimenting to manipulate "
+"people's minds</a>, and impose a new way of advertising by altering their "
 "dreams. This &ldquo;targeted dream incubation&rdquo; would trigger &ldquo;"
 "refreshing dreams&rdquo; of the product, according to the companies."
 msgstr ""
@@ -4210,9 +4210,9 @@
 msgid ""
 "One kind of malicious functionality is censorship of what users can access.  "
 "Here are examples of programs which do this.  We have a <a href=\"/"
-"proprietary/proprietary-jails.html#about-page\">separate list of proprietary "
-"systems that censor installation</a> of application programs (we call them "
-"&ldquo;jails&rdquo;)."
+"proprietary/proprietary-jails.html\">separate list of proprietary systems "
+"that censor installation</a> of application programs (we call them &ldquo;"
+"jails&rdquo;)."
 msgstr ""
 
 #. type: Content of: <div><div><p>

Index: pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.326
retrieving revision 1.327
diff -u -b -r1.326 -r1.327
--- pot 15 Jul 2021 06:32:48 -0000      1.326
+++ pot 15 Jul 2021 07:33:50 -0000      1.327
@@ -369,7 +369,7 @@
 #. type: Content of: <div><ul><li><p>
 msgid ""
 "A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn.";
-"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\">can allow "
+"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
 "crackers to remotely gain access to the operating system</a> and install "
 "programs, view and delete data, or even create new user accounts with full "
 "user rights."
@@ -391,8 +391,8 @@
 #. type: Content of: <div><ul><li><p>
 msgid ""
 "<a href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-";
-"dream-incubation\">Advertising companies are experimenting to manipulate "
-"people's minds</a> and impose a new way of advertising by altering their "
+"dream-incubation\"> Advertising companies are experimenting to manipulate "
+"people's minds</a>, and impose a new way of advertising by altering their "
 "dreams. This &ldquo;targeted dream incubation&rdquo; would trigger &ldquo;"
 "refreshing dreams&rdquo; of the product, according to the companies."
 msgstr ""
@@ -3992,9 +3992,9 @@
 msgid ""
 "One kind of malicious functionality is censorship of what users can access.  "
 "Here are examples of programs which do this.  We have a <a href=\"/"
-"proprietary/proprietary-jails.html#about-page\">separate list of proprietary "
-"systems that censor installation</a> of application programs (we call them "
-"&ldquo;jails&rdquo;)."
+"proprietary/proprietary-jails.html\">separate list of proprietary systems "
+"that censor installation</a> of application programs (we call them &ldquo;"
+"jails&rdquo;)."
 msgstr ""
 
 #. type: Content of: <div><div><p>

Index: potential-malware.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/potential-malware.de-diff.html,v
retrieving revision 1.17
retrieving revision 1.18
diff -u -b -r1.17 -r1.18
--- potential-malware.de-diff.html      15 Jul 2021 06:32:48 -0000      1.17
+++ potential-malware.de-diff.html      15 Jul 2021 07:33:50 -0000      1.18
@@ -73,8 +73,13 @@
   &lt;li <span class="inserted"><ins><em>id="M202107050"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;&lt;a 
href="https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-dream-incubation"&gt;Advertising
-  companies are experimenting to manipulate people's minds&lt;/a&gt; and 
impose a new way of advertising by altering their dreams. This &ldquo;targeted 
dream incubation&rdquo; would trigger &ldquo;refreshing dreams&rdquo; of the 
product, according to the companies.&lt;/p&gt;
+    &lt;p&gt;&lt;a
+    
href="https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-dream-incubation"&gt;
+    Advertising companies are experimenting to manipulate people's
+    minds&lt;/a&gt;, and impose a new way of advertising by altering their
+    dreams. This &ldquo;targeted dream incubation&rdquo; would trigger
+    &ldquo;refreshing dreams&rdquo; of the product, according to the
+    companies.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201903280"&gt;
@@ -220,7 +225,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/07/15 06:32:48 $
+$Date: 2021/07/15 07:33:50 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: potential-malware.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/potential-malware.de.po,v
retrieving revision 1.19
retrieving revision 1.20
diff -u -b -r1.19 -r1.20
--- potential-malware.de.po     15 Jul 2021 06:32:48 -0000      1.19
+++ potential-malware.de.po     15 Jul 2021 07:33:50 -0000      1.20
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: potential-malware.html\n"
 "Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2021-07-15 06:25+0000\n"
+"POT-Creation-Date: 2021-07-15 07:26+0000\n"
 "PO-Revision-Date: 2018-07-20 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <www-de-translators@gnu.org>\n"
@@ -137,8 +137,8 @@
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
 "<a href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-";
-"dream-incubation\">Advertising companies are experimenting to manipulate "
-"people's minds</a> and impose a new way of advertising by altering their "
+"dream-incubation\"> Advertising companies are experimenting to manipulate "
+"people's minds</a>, and impose a new way of advertising by altering their "
 "dreams. This &ldquo;targeted dream incubation&rdquo; would trigger &ldquo;"
 "refreshing dreams&rdquo; of the product, according to the companies."
 msgstr ""

Index: potential-malware.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/potential-malware.es.po,v
retrieving revision 1.15
retrieving revision 1.16
diff -u -b -r1.15 -r1.16
--- potential-malware.es.po     15 Jul 2021 06:32:48 -0000      1.15
+++ potential-malware.es.po     15 Jul 2021 07:33:50 -0000      1.16
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: potential-malware.html\n"
-"POT-Creation-Date: 2021-07-15 06:25+0000\n"
+"POT-Creation-Date: 2021-07-15 07:26+0000\n"
 "PO-Revision-Date: 2021-01-19 10:24+0100\n"
 "Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
 "Language-Team: Spanish\n"
@@ -96,8 +96,8 @@
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
 "<a href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-";
-"dream-incubation\">Advertising companies are experimenting to manipulate "
-"people's minds</a> and impose a new way of advertising by altering their "
+"dream-incubation\"> Advertising companies are experimenting to manipulate "
+"people's minds</a>, and impose a new way of advertising by altering their "
 "dreams. This &ldquo;targeted dream incubation&rdquo; would trigger &ldquo;"
 "refreshing dreams&rdquo; of the product, according to the companies."
 msgstr ""

Index: potential-malware.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/potential-malware.fr.po,v
retrieving revision 1.27
retrieving revision 1.28
diff -u -b -r1.27 -r1.28
--- potential-malware.fr.po     15 Jul 2021 06:32:48 -0000      1.27
+++ potential-malware.fr.po     15 Jul 2021 07:33:50 -0000      1.28
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: potential-malware.html\n"
-"POT-Creation-Date: 2021-07-15 06:25+0000\n"
+"POT-Creation-Date: 2021-07-15 07:26+0000\n"
 "PO-Revision-Date: 2019-11-18 18:14+0100\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <trad-gnu@april.org>\n"
@@ -89,8 +89,8 @@
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
 "<a href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-";
-"dream-incubation\">Advertising companies are experimenting to manipulate "
-"people's minds</a> and impose a new way of advertising by altering their "
+"dream-incubation\"> Advertising companies are experimenting to manipulate "
+"people's minds</a>, and impose a new way of advertising by altering their "
 "dreams. This &ldquo;targeted dream incubation&rdquo; would trigger &ldquo;"
 "refreshing dreams&rdquo; of the product, according to the companies."
 msgstr ""

Index: potential-malware.pot
===================================================================
RCS file: /web/www/www/proprietary/po/potential-malware.pot,v
retrieving revision 1.15
retrieving revision 1.16
diff -u -b -r1.15 -r1.16
--- potential-malware.pot       15 Jul 2021 06:32:48 -0000      1.15
+++ potential-malware.pot       15 Jul 2021 07:33:50 -0000      1.16
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: potential-malware.html\n"
-"POT-Creation-Date: 2021-07-15 06:25+0000\n"
+"POT-Creation-Date: 2021-07-15 07:26+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL@li.org>\n"
@@ -78,11 +78,11 @@
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
 "<a "
-"href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-dream-incubation\";>Advertising
 "
-"companies are experimenting to manipulate people's minds</a> and impose a "
-"new way of advertising by altering their dreams. This &ldquo;targeted dream "
-"incubation&rdquo; would trigger &ldquo;refreshing dreams&rdquo; of the "
-"product, according to the companies."
+"href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-dream-incubation\";>
 "
+"Advertising companies are experimenting to manipulate people's minds</a>, "
+"and impose a new way of advertising by altering their dreams. This "
+"&ldquo;targeted dream incubation&rdquo; would trigger &ldquo;refreshing "
+"dreams&rdquo; of the product, according to the companies."
 msgstr ""
 
 #. type: Content of: <div><div><ul><li><p>

Index: potential-malware.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/potential-malware.pt-br.po,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -b -r1.2 -r1.3
--- potential-malware.pt-br.po  15 Jul 2021 06:32:48 -0000      1.2
+++ potential-malware.pt-br.po  15 Jul 2021 07:33:50 -0000      1.3
@@ -5,7 +5,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: potential-malware.html\n"
-"POT-Creation-Date: 2021-07-15 06:25+0000\n"
+"POT-Creation-Date: 2021-07-15 07:26+0000\n"
 "PO-Revision-Date: 2021-06-26 09:39-0300\n"
 "Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
 "Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -90,8 +90,8 @@
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
 "<a href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-";
-"dream-incubation\">Advertising companies are experimenting to manipulate "
-"people's minds</a> and impose a new way of advertising by altering their "
+"dream-incubation\"> Advertising companies are experimenting to manipulate "
+"people's minds</a>, and impose a new way of advertising by altering their "
 "dreams. This &ldquo;targeted dream incubation&rdquo; would trigger &ldquo;"
 "refreshing dreams&rdquo; of the product, according to the companies."
 msgstr ""

Index: potential-malware.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/potential-malware.ru.po,v
retrieving revision 1.33
retrieving revision 1.34
diff -u -b -r1.33 -r1.34
--- potential-malware.ru.po     15 Jul 2021 06:32:48 -0000      1.33
+++ potential-malware.ru.po     15 Jul 2021 07:33:50 -0000      1.34
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2021-07-15 06:25+0000\n"
+"POT-Creation-Date: 2021-07-15 07:26+0000\n"
 "PO-Revision-Date: 2020-05-25 16:59+0000\n"
 "Last-Translator: Ineiev <ineiev@gnu.org>\n"
 "Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -93,8 +93,8 @@
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
 "<a href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-";
-"dream-incubation\">Advertising companies are experimenting to manipulate "
-"people's minds</a> and impose a new way of advertising by altering their "
+"dream-incubation\"> Advertising companies are experimenting to manipulate "
+"people's minds</a>, and impose a new way of advertising by altering their "
 "dreams. This &ldquo;targeted dream incubation&rdquo; would trigger &ldquo;"
 "refreshing dreams&rdquo; of the product, according to the companies."
 msgstr ""

Index: proprietary-censorship.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-censorship.de-diff.html,v
retrieving revision 1.16
retrieving revision 1.17
diff -u -b -r1.16 -r1.17
--- proprietary-censorship.de-diff.html 8 Jun 2021 08:44:43 -0000       1.16
+++ proprietary-censorship.de-diff.html 15 Jul 2021 07:33:50 -0000      1.17
@@ -64,8 +64,7 @@
 &lt;p&gt;One kind of malicious functionality is</em></ins></span> censorship 
<span class="removed"><del><strong>on</strong></del></span> <span 
class="inserted"><ins><em>of</em></ins></span> what <span 
class="removed"><del><strong>their</strong></del></span>
 users can access.  <span class="inserted"><ins><em>Here are examples of 
programs which do this.</em></ins></span>
 We have a &lt;a
-<span 
class="removed"><del><strong>href="/proprietary/proprietary-jails.html"&gt;separate</strong></del></span>
-<span 
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html#about-page"&gt;separate</em></ins></span>
+href="/proprietary/proprietary-jails.html"&gt;separate
 list of proprietary systems that censor installation&lt;/a&gt; of
 application programs (we call them <span 
class="removed"><del><strong>&ldquo;jails&rdquo;.)&lt;/p&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>&ldquo;jails&rdquo;).&lt;/p&gt;</em></ins></span>
 
@@ -232,7 +231,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/06/08 08:44:43 $
+$Date: 2021/07/15 07:33:50 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-censorship.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-censorship.de.po,v
retrieving revision 1.58
retrieving revision 1.59
diff -u -b -r1.58 -r1.59
--- proprietary-censorship.de.po        31 May 2021 13:39:55 -0000      1.58
+++ proprietary-censorship.de.po        15 Jul 2021 07:33:50 -0000      1.59
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary-censorship.html\n"
 "Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2021-01-18 12:56+0000\n"
+"POT-Creation-Date: 2021-07-15 07:26+0000\n"
 "PO-Revision-Date: 2018-08-29 03:06+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <www-de-translators@gnu.org>\n"
@@ -126,10 +126,9 @@
 # | [-Here are examples-]{+One kind+} of [-proprietary systems that impose-]
 # | {+malicious functionality is+} censorship o[-n-]{+f+} what [-their-] users
 # | can access.  {+Here are examples of programs which do this.+}  We have a
-# | <a [-href=\"/proprietary/proprietary-jails.html\">separate-]
-# | {+href=\"/proprietary/proprietary-jails.html#about-page\">separate+} list
-# | of proprietary systems that censor installation</a> of application
-# | programs (we call them [-&ldquo;jails&rdquo;.)-] {+&ldquo;jails&rdquo;).+}
+# | <a href=\"/proprietary/proprietary-jails.html\">separate list of
+# | proprietary systems that censor installation</a> of application programs
+# | (we call them [-&ldquo;jails&rdquo;.)-] {+&ldquo;jails&rdquo;).+}
 #, fuzzy
 #| msgid ""
 #| "Here are examples of proprietary systems that impose censorship on what "
@@ -140,9 +139,9 @@
 msgid ""
 "One kind of malicious functionality is censorship of what users can access.  "
 "Here are examples of programs which do this.  We have a <a href=\"/"
-"proprietary/proprietary-jails.html#about-page\">separate list of proprietary "
-"systems that censor installation</a> of application programs (we call them "
-"&ldquo;jails&rdquo;)."
+"proprietary/proprietary-jails.html\">separate list of proprietary systems "
+"that censor installation</a> of application programs (we call them &ldquo;"
+"jails&rdquo;)."
 msgstr ""
 "Hier nennen wir Beispiele von proprietären Systemen, die dem Zensur "
 "auferlegen, worauf Nutzer zugreifen können. Beachten Sie bitte auch das "

Index: proprietary-censorship.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-censorship.es.po,v
retrieving revision 1.69
retrieving revision 1.70
diff -u -b -r1.69 -r1.70
--- proprietary-censorship.es.po        1 Jun 2021 15:27:22 -0000       1.69
+++ proprietary-censorship.es.po        15 Jul 2021 07:33:50 -0000      1.70
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-censorship.html\n"
-"POT-Creation-Date: 2021-01-18 12:56+0000\n"
+"POT-Creation-Date: 2021-07-15 07:26+0000\n"
 "PO-Revision-Date: 2021-01-19 10:24+0100\n"
 "Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
 "Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=utf-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-07-15 07:26+0000\n"
 "X-Generator: Poedit 2.2.1\n"
 
 #. type: Content of: <title>
@@ -82,12 +83,25 @@
 "Habitualmente, esto suele realizarse mediante funcionalidades maliciosas."
 
 #. type: Content of: <div><div><p>
+# | One kind of malicious functionality is censorship of what users can
+# | access.  Here are examples of programs which do this.  We have a <a
+# | [-href=\"/proprietary/proprietary-jails.html#about-page\">separate-]
+# | {+href=\"/proprietary/proprietary-jails.html\">separate+} list of
+# | proprietary systems that censor installation</a> of application programs
+# | (we call them &ldquo;jails&rdquo;).
+#, fuzzy
+#| msgid ""
+#| "One kind of malicious functionality is censorship of what users can "
+#| "access.  Here are examples of programs which do this.  We have a <a href="
+#| "\"/proprietary/proprietary-jails.html#about-page\">separate list of "
+#| "proprietary systems that censor installation</a> of application programs "
+#| "(we call them &ldquo;jails&rdquo;)."
 msgid ""
 "One kind of malicious functionality is censorship of what users can access.  "
 "Here are examples of programs which do this.  We have a <a href=\"/"
-"proprietary/proprietary-jails.html#about-page\">separate list of proprietary "
-"systems that censor installation</a> of application programs (we call them "
-"&ldquo;jails&rdquo;)."
+"proprietary/proprietary-jails.html\">separate list of proprietary systems "
+"that censor installation</a> of application programs (we call them &ldquo;"
+"jails&rdquo;)."
 msgstr ""
 "Un tipo de funcionalidad maliciosa es la que censura a qué pueden acceder "
 "los usuarios. Se presentan aquí ejemplos de programas que lo hacen. Tenemos "

Index: proprietary-censorship.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-censorship.fr.po,v
retrieving revision 1.67
retrieving revision 1.68
diff -u -b -r1.67 -r1.68
--- proprietary-censorship.fr.po        31 May 2021 21:09:18 -0000      1.67
+++ proprietary-censorship.fr.po        15 Jul 2021 07:33:50 -0000      1.68
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-censorship.html\n"
-"POT-Creation-Date: 2021-01-18 12:56+0000\n"
+"POT-Creation-Date: 2021-07-15 07:26+0000\n"
 "PO-Revision-Date: 2020-11-10 20:33+0100\n"
 "Last-Translator: Félicien Pillot <felicien AT gnu.org>\n"
 "Language-Team: French <trad-gnu@april.org>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-07-15 07:26+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Censorship - GNU Project - Free Software Foundation"
@@ -78,12 +79,25 @@
 msgstr "Cela prend habituellement la forme de fonctionnalités malveillantes."
 
 #. type: Content of: <div><div><p>
+# | One kind of malicious functionality is censorship of what users can
+# | access.  Here are examples of programs which do this.  We have a <a
+# | [-href=\"/proprietary/proprietary-jails.html#about-page\">separate-]
+# | {+href=\"/proprietary/proprietary-jails.html\">separate+} list of
+# | proprietary systems that censor installation</a> of application programs
+# | (we call them &ldquo;jails&rdquo;).
+#, fuzzy
+#| msgid ""
+#| "One kind of malicious functionality is censorship of what users can "
+#| "access.  Here are examples of programs which do this.  We have a <a href="
+#| "\"/proprietary/proprietary-jails.html#about-page\">separate list of "
+#| "proprietary systems that censor installation</a> of application programs "
+#| "(we call them &ldquo;jails&rdquo;)."
 msgid ""
 "One kind of malicious functionality is censorship of what users can access.  "
 "Here are examples of programs which do this.  We have a <a href=\"/"
-"proprietary/proprietary-jails.html#about-page\">separate list of proprietary "
-"systems that censor installation</a> of application programs (we call them "
-"&ldquo;jails&rdquo;)."
+"proprietary/proprietary-jails.html\">separate list of proprietary systems "
+"that censor installation</a> of application programs (we call them &ldquo;"
+"jails&rdquo;)."
 msgstr ""
 "L'une de ces fonctionnalités malveillantes est de censurer les choses "
 "auxquelles leurs utilisateurs ont accès. Voici des exemples de programmes "

Index: proprietary-censorship.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-censorship.it-diff.html,v
retrieving revision 1.34
retrieving revision 1.35
diff -u -b -r1.34 -r1.35
--- proprietary-censorship.it-diff.html 1 Jun 2021 09:44:00 -0000       1.34
+++ proprietary-censorship.it-diff.html 15 Jul 2021 07:33:50 -0000      1.35
@@ -64,8 +64,7 @@
 &lt;p&gt;One kind of malicious functionality is</em></ins></span> censorship 
<span class="removed"><del><strong>on</strong></del></span> <span 
class="inserted"><ins><em>of</em></ins></span> what <span 
class="removed"><del><strong>their</strong></del></span>
 users can access.  <span class="inserted"><ins><em>Here are examples of 
programs which do this.</em></ins></span>
 We have a &lt;a
-<span 
class="removed"><del><strong>href="/proprietary/proprietary-jails.html"&gt;separate</strong></del></span>
-<span 
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html#about-page"&gt;separate</em></ins></span>
+href="/proprietary/proprietary-jails.html"&gt;separate
 list of proprietary systems that censor installation&lt;/a&gt; of
 application programs (we call them <span 
class="removed"><del><strong>&ldquo;jails&rdquo;.)&lt;/p&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>&ldquo;jails&rdquo;).&lt;/p&gt;</em></ins></span>
 
@@ -248,7 +247,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/06/01 09:44:00 $
+$Date: 2021/07/15 07:33:50 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-censorship.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-censorship.it.po,v
retrieving revision 1.61
retrieving revision 1.62
diff -u -b -r1.61 -r1.62
--- proprietary-censorship.it.po        30 Apr 2021 06:36:19 -0000      1.61
+++ proprietary-censorship.it.po        15 Jul 2021 07:33:50 -0000      1.62
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-censorship.html\n"
-"POT-Creation-Date: 2021-01-18 12:56+0000\n"
+"POT-Creation-Date: 2021-07-15 07:26+0000\n"
 "PO-Revision-Date: 2017-07-06 22:33+0100\n"
 "Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
 "Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -120,10 +120,9 @@
 # | [-Here are examples-]{+One kind+} of [-proprietary systems that impose-]
 # | {+malicious functionality is+} censorship o[-n-]{+f+} what [-their-] users
 # | can access.  {+Here are examples of programs which do this.+}  We have a
-# | <a [-href=\"/proprietary/proprietary-jails.html\">separate-]
-# | {+href=\"/proprietary/proprietary-jails.html#about-page\">separate+} list
-# | of proprietary systems that censor installation</a> of application
-# | programs (we call them [-&ldquo;jails&rdquo;.)-] {+&ldquo;jails&rdquo;).+}
+# | <a href=\"/proprietary/proprietary-jails.html\">separate list of
+# | proprietary systems that censor installation</a> of application programs
+# | (we call them [-&ldquo;jails&rdquo;.)-] {+&ldquo;jails&rdquo;).+}
 #, fuzzy
 #| msgid ""
 #| "Here are examples of proprietary systems that impose censorship on what "
@@ -134,9 +133,9 @@
 msgid ""
 "One kind of malicious functionality is censorship of what users can access.  "
 "Here are examples of programs which do this.  We have a <a href=\"/"
-"proprietary/proprietary-jails.html#about-page\">separate list of proprietary "
-"systems that censor installation</a> of application programs (we call them "
-"&ldquo;jails&rdquo;)."
+"proprietary/proprietary-jails.html\">separate list of proprietary systems "
+"that censor installation</a> of application programs (we call them &ldquo;"
+"jails&rdquo;)."
 msgstr ""
 "Ecco alcuni esempi di sistemi proprietari che censurano il contenuto "
 "richiesto dai propri utenti. Rendiamo disponibile, separatamente, anche un "

Index: proprietary-censorship.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-censorship.ja-diff.html,v
retrieving revision 1.40
retrieving revision 1.41
diff -u -b -r1.40 -r1.41
--- proprietary-censorship.ja-diff.html 1 Jul 2021 02:03:53 -0000       1.40
+++ proprietary-censorship.ja-diff.html 15 Jul 2021 07:33:50 -0000      1.41
@@ -64,8 +64,7 @@
 &lt;p&gt;One kind of malicious functionality is</em></ins></span> censorship 
<span class="removed"><del><strong>on</strong></del></span> <span 
class="inserted"><ins><em>of</em></ins></span> what <span 
class="removed"><del><strong>their</strong></del></span>
 users can access.  <span class="inserted"><ins><em>Here are examples of 
programs which do this.</em></ins></span>
 We have a &lt;a
-<span 
class="removed"><del><strong>href="/proprietary/proprietary-jails.html"&gt;separate</strong></del></span>
-<span 
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html#about-page"&gt;separate</em></ins></span>
+href="/proprietary/proprietary-jails.html"&gt;separate
 list of proprietary systems that censor installation&lt;/a&gt; of
 application programs (we call them <span 
class="removed"><del><strong>&ldquo;jails&rdquo;.)&lt;/p&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>&ldquo;jails&rdquo;).&lt;/p&gt;</em></ins></span>
 
@@ -271,7 +270,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/07/01 02:03:53 $
+$Date: 2021/07/15 07:33:50 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-censorship.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-censorship.ja.po,v
retrieving revision 1.48
retrieving revision 1.49
diff -u -b -r1.48 -r1.49
--- proprietary-censorship.ja.po        18 Jan 2021 13:10:31 -0000      1.48
+++ proprietary-censorship.ja.po        15 Jul 2021 07:33:50 -0000      1.49
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-censorship.html\n"
-"POT-Creation-Date: 2021-01-18 12:56+0000\n"
+"POT-Creation-Date: 2021-07-15 07:26+0000\n"
 "PO-Revision-Date: 2016-04-05 14:30+0900\n"
 "Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
 "Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -111,9 +111,9 @@
 msgid ""
 "One kind of malicious functionality is censorship of what users can access.  "
 "Here are examples of programs which do this.  We have a <a href=\"/"
-"proprietary/proprietary-jails.html#about-page\">separate list of proprietary "
-"systems that censor installation</a> of application programs (we call them "
-"&ldquo;jails&rdquo;)."
+"proprietary/proprietary-jails.html\">separate list of proprietary systems "
+"that censor installation</a> of application programs (we call them &ldquo;"
+"jails&rdquo;)."
 msgstr ""
 
"こちらがユーザがアクセスできるものに対して検閲を強制するプロプライエタリのシ"
 "ステムの例です。アプリケーション・プログラムの<a 
href=\"/proprietary/"

Index: proprietary-censorship.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-censorship.pot,v
retrieving revision 1.32
retrieving revision 1.33
diff -u -b -r1.32 -r1.33
--- proprietary-censorship.pot  18 Jan 2021 13:10:31 -0000      1.32
+++ proprietary-censorship.pot  15 Jul 2021 07:33:50 -0000      1.33
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-censorship.html\n"
-"POT-Creation-Date: 2021-01-18 12:56+0000\n"
+"POT-Creation-Date: 2021-07-15 07:26+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL@li.org>\n"
@@ -72,9 +72,9 @@
 msgid ""
 "One kind of malicious functionality is censorship of what users can access.  "
 "Here are examples of programs which do this.  We have a <a "
-"href=\"/proprietary/proprietary-jails.html#about-page\">separate list of "
-"proprietary systems that censor installation</a> of application programs (we "
-"call them &ldquo;jails&rdquo;)."
+"href=\"/proprietary/proprietary-jails.html\">separate list of proprietary "
+"systems that censor installation</a> of application programs (we call them "
+"&ldquo;jails&rdquo;)."
 msgstr ""
 
 #. type: Content of: <div><div><p>

Index: proprietary-censorship.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-censorship.pt-br.po,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -b -r1.1 -r1.2
--- proprietary-censorship.pt-br.po     26 Jun 2021 13:41:57 -0000      1.1
+++ proprietary-censorship.pt-br.po     15 Jul 2021 07:33:50 -0000      1.2
@@ -5,7 +5,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-censorship.html\n"
-"POT-Creation-Date: 2021-01-18 12:56+0000\n"
+"POT-Creation-Date: 2021-07-15 07:26+0000\n"
 "PO-Revision-Date: 2021-06-26 09:40-0300\n"
 "Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
 "Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -13,6 +13,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-07-15 07:26+0000\n"
 "Plural-Forms: nplurals=2; plural=(n > 1);\n"
 
 #. type: Content of: <title>
@@ -77,12 +78,19 @@
 msgstr "Isso geralmente assume a forma de funcionalidades maliciosas."
 
 #. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "One kind of malicious functionality is censorship of what users can "
+#| "access.  Here are examples of programs which do this.  We have a <a href="
+#| "\"/proprietary/proprietary-jails.html#about-page\">separate list of "
+#| "proprietary systems that censor installation</a> of application programs "
+#| "(we call them &ldquo;jails&rdquo;)."
 msgid ""
 "One kind of malicious functionality is censorship of what users can access.  "
 "Here are examples of programs which do this.  We have a <a href=\"/"
-"proprietary/proprietary-jails.html#about-page\">separate list of proprietary "
-"systems that censor installation</a> of application programs (we call them "
-"&ldquo;jails&rdquo;)."
+"proprietary/proprietary-jails.html\">separate list of proprietary systems "
+"that censor installation</a> of application programs (we call them &ldquo;"
+"jails&rdquo;)."
 msgstr ""
 "Um tipo de funcionalidade maliciosa é a censura do que os usuários podem "
 "acessar. Aqui estão alguns exemplos de programas que fazem isso. Temos uma "

Index: proprietary-censorship.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-censorship.ru.po,v
retrieving revision 1.76
retrieving revision 1.77
diff -u -b -r1.76 -r1.77
--- proprietary-censorship.ru.po        1 Jun 2021 15:27:22 -0000       1.76
+++ proprietary-censorship.ru.po        15 Jul 2021 07:33:50 -0000      1.77
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2021-01-18 12:56+0000\n"
+"POT-Creation-Date: 2021-07-15 07:26+0000\n"
 "PO-Revision-Date: 2020-05-25 16:59+0000\n"
 "Last-Translator: Ineiev <ineiev@gnu.org>\n"
 "Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-07-15 07:26+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Censorship - GNU Project - Free Software Foundation"
@@ -80,12 +81,25 @@
 msgstr "Как правило, это принимает форму 
вредоносных функций."
 
 #. type: Content of: <div><div><p>
+# | One kind of malicious functionality is censorship of what users can
+# | access.  Here are examples of programs which do this.  We have a <a
+# | [-href=\"/proprietary/proprietary-jails.html#about-page\">separate-]
+# | {+href=\"/proprietary/proprietary-jails.html\">separate+} list of
+# | proprietary systems that censor installation</a> of application programs
+# | (we call them &ldquo;jails&rdquo;).
+#, fuzzy
+#| msgid ""
+#| "One kind of malicious functionality is censorship of what users can "
+#| "access.  Here are examples of programs which do this.  We have a <a href="
+#| "\"/proprietary/proprietary-jails.html#about-page\">separate list of "
+#| "proprietary systems that censor installation</a> of application programs "
+#| "(we call them &ldquo;jails&rdquo;)."
 msgid ""
 "One kind of malicious functionality is censorship of what users can access.  "
 "Here are examples of programs which do this.  We have a <a href=\"/"
-"proprietary/proprietary-jails.html#about-page\">separate list of proprietary "
-"systems that censor installation</a> of application programs (we call them "
-"&ldquo;jails&rdquo;)."
+"proprietary/proprietary-jails.html\">separate list of proprietary systems "
+"that censor installation</a> of application programs (we call them &ldquo;"
+"jails&rdquo;)."
 msgstr ""
 "Один из видов вредоносных функций&nbsp;&mdash; 
цензура доступа пользователей."
 "Вот примеры программ, которые это делают. 
У нас есть <a href=\"/proprietary/"

Index: proprietary-insecurity.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.de-diff.html,v
retrieving revision 1.82
retrieving revision 1.83
diff -u -b -r1.82 -r1.83
--- proprietary-insecurity.de-diff.html 15 Jul 2021 06:32:49 -0000      1.82
+++ proprietary-insecurity.de-diff.html 15 Jul 2021 07:33:50 -0000      1.83
@@ -100,7 +100,11 @@
   &lt;li id="M202107090"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;A newly found Microsoft Windows vulnerability &lt;a 
href="https://edition.cnn.com/2021/07/08/tech/microsoft-windows-10-printnightmare/"&gt;can
 allow crackers to remotely gain access to the operating system&lt;/a&gt; and 
install programs, view and delete data, or even create new user accounts with 
full user rights.&lt;/p&gt;
+    &lt;p&gt;A newly found Microsoft Windows vulnerability &lt;a
+    
href="https://edition.cnn.com/2021/07/08/tech/microsoft-windows-10-printnightmare/"&gt;
+    can allow crackers to remotely gain access to the operating 
system&lt;/a&gt;
+    and install programs, view and delete data, or even create new user
+    accounts with full user rights.&lt;/p&gt;
 
     &lt;p&gt;The security research firm accidentally leaked instructions on
     how the flaw could be exploited but Windows users should still wait
@@ -316,11 +320,8 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;&lt;a
     
href="https://www.wired.com/story/ripple20-iot-vulnerabilities/?bxid=5bd66d4c2ddf9c619437e4b8&amp;cndid=9608804&amp;esrc=Wired_etl_load&amp;source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&amp;utm_bran%5C"&gt;
-    A disasterous security bug&lt;/a&gt; touches millions of products 
in</em></ins></span> the <span class="removed"><del><strong>specifics.&lt;/p&gt;
-
-&lt;ul&gt;
-&lt;li&gt;</strong></del></span>
-    <span class="inserted"><ins><em>Internet of Stings.&lt;/p&gt;
+    A disasterous security bug&lt;/a&gt; touches millions of products in the
+    Internet of Stings.&lt;/p&gt;
 
     &lt;p&gt;As a result, anyone can sting the user, not only the
     manufacturer.&lt;/p&gt;
@@ -468,7 +469,10 @@
   &lt;li id="M201808130"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-08&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Since the beginning of 2017, &lt;a
+    &lt;p&gt;Since</em></ins></span> the <span 
class="removed"><del><strong>specifics.&lt;/p&gt;
+
+&lt;ul&gt;
+&lt;li&gt;</strong></del></span> <span class="inserted"><ins><em>beginning of 
2017, &lt;a
     
href="https://qz.com/1131515/google-collects-android-users-locations-even-when-location-services-are-disabled/"&gt;Android
     phones have been collecting the addresses of nearby cellular
     towers&lt;/a&gt;, even when location services are disabled, and sending
@@ -1469,7 +1473,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/07/15 06:32:49 $
+$Date: 2021/07/15 07:33:50 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-insecurity.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.de.po,v
retrieving revision 1.180
retrieving revision 1.181
diff -u -b -r1.180 -r1.181
--- proprietary-insecurity.de.po        15 Jul 2021 06:32:49 -0000      1.180
+++ proprietary-insecurity.de.po        15 Jul 2021 07:33:50 -0000      1.181
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
 "Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2021-07-15 06:25+0000\n"
+"POT-Creation-Date: 2021-07-15 07:26+0000\n"
 "PO-Revision-Date: 2018-08-29 02:41+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <www-de-translators@gnu.org>\n"
@@ -166,7 +166,7 @@
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
 "A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn.";
-"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\">can allow "
+"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
 "crackers to remotely gain access to the operating system</a> and install "
 "programs, view and delete data, or even create new user accounts with full "
 "user rights."

Index: proprietary-insecurity.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.es.po,v
retrieving revision 1.110
retrieving revision 1.111
diff -u -b -r1.110 -r1.111
--- proprietary-insecurity.es.po        15 Jul 2021 06:32:49 -0000      1.110
+++ proprietary-insecurity.es.po        15 Jul 2021 07:33:50 -0000      1.111
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2021-07-15 06:25+0000\n"
+"POT-Creation-Date: 2021-07-15 07:26+0000\n"
 "PO-Revision-Date: \n"
 "Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
 "Language-Team: \n"
@@ -127,7 +127,7 @@
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
 "A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn.";
-"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\">can allow "
+"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
 "crackers to remotely gain access to the operating system</a> and install "
 "programs, view and delete data, or even create new user accounts with full "
 "user rights."

Index: proprietary-insecurity.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.fr.po,v
retrieving revision 1.260
retrieving revision 1.261
diff -u -b -r1.260 -r1.261
--- proprietary-insecurity.fr.po        15 Jul 2021 06:32:49 -0000      1.260
+++ proprietary-insecurity.fr.po        15 Jul 2021 07:33:50 -0000      1.261
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2021-07-15 06:25+0000\n"
+"POT-Creation-Date: 2021-07-15 07:26+0000\n"
 "PO-Revision-Date: 2021-06-28 20:57+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <trad-gnu@april.org>\n"
@@ -127,7 +127,7 @@
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
 "A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn.";
-"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\">can allow "
+"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
 "crackers to remotely gain access to the operating system</a> and install "
 "programs, view and delete data, or even create new user accounts with full "
 "user rights."

Index: proprietary-insecurity.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.it-diff.html,v
retrieving revision 1.95
retrieving revision 1.96
diff -u -b -r1.95 -r1.96
--- proprietary-insecurity.it-diff.html 15 Jul 2021 06:32:49 -0000      1.95
+++ proprietary-insecurity.it-diff.html 15 Jul 2021 07:33:50 -0000      1.96
@@ -91,7 +91,11 @@
   &lt;li id="M202107090"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;A newly found Microsoft Windows vulnerability &lt;a 
href="https://edition.cnn.com/2021/07/08/tech/microsoft-windows-10-printnightmare/"&gt;can
 allow crackers to remotely gain access to the operating system&lt;/a&gt; and 
install programs, view and delete data, or even create new user accounts with 
full user rights.&lt;/p&gt;
+    &lt;p&gt;A newly found Microsoft Windows vulnerability &lt;a
+    
href="https://edition.cnn.com/2021/07/08/tech/microsoft-windows-10-printnightmare/"&gt;
+    can allow crackers to remotely gain access to the operating 
system&lt;/a&gt;
+    and install programs, view and delete data, or even create new user
+    accounts with full user rights.&lt;/p&gt;
 
     &lt;p&gt;The security research firm accidentally leaked instructions on
     how the flaw could be exploited</em></ins></span> but <span 
class="inserted"><ins><em>Windows users should still wait
@@ -139,14 +143,14 @@
   &lt;li id="M202105030"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-05&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The United States' government is reportedly considering &lt;a
+    &lt;p&gt;The United States' government</em></ins></span> is <span 
class="removed"><del><strong>discovered.</strong></del></span> <span 
class="inserted"><ins><em>reportedly considering &lt;a
     
href="https://www.infosecurity-magazine.com/news/private-companies-may-spy-on/"&gt;teaming
     up with private companies to monitor American citizens' private online
     activity and digital communications&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;What creates the opportunity to try this is the fact that these
     companies are already snooping on users' private activities. That
-    in turn</em></ins></span> is <span 
class="removed"><del><strong>discovered.</strong></del></span> <span 
class="inserted"><ins><em>due to people's use of nonfree software which snoops,
+    in turn is due to people's use of nonfree software which snoops,
     and online dis-services which snoop.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -158,14 +162,14 @@
     be used to launch remote code execution (RCE) attacks&lt;/a&gt; has been
     disclosed by researchers.</em></ins></span> The
 <span class="removed"><del><strong>examples below show</strong></del></span> 
<span class="inserted"><ins><em>researchers demonstrated a three-bug
-    attack chain</em></ins></span> that <span class="inserted"><ins><em>caused 
an RCE on a target machine, all this without
+    attack chain that caused an RCE on a target machine, all this without
     any form of user interaction.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M202103090"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-03&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;&lt;a 
href="https://www.bloomberg.com/news/articles/2021-03-09/hackers-expose-tesla-jails-in-breach-of-150-000-security-cams"&gt;Over
 150 thousand security cameras that used Verkada
+    &lt;p&gt;&lt;a 
href="https://www.bloomberg.com/news/articles/2021-03-09/hackers-expose-tesla-jails-in-breach-of-150-000-security-cams"&gt;Over
 150 thousand security cameras</em></ins></span> that <span 
class="inserted"><ins><em>used Verkada
     company's</em></ins></span> proprietary software <span 
class="removed"><del><strong>isn't perfect,</strong></del></span> <span 
class="inserted"><ins><em>are cracked&lt;/a&gt; by a major security
     breach. Crackers have had access to security archives of various
     gyms, hospitals, jails, schools,</em></ins></span> and <span 
class="inserted"><ins><em>police stations that have used
@@ -1443,7 +1447,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/07/15 06:32:49 $
+$Date: 2021/07/15 07:33:50 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-insecurity.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.it.po,v
retrieving revision 1.197
retrieving revision 1.198
diff -u -b -r1.197 -r1.198
--- proprietary-insecurity.it.po        15 Jul 2021 06:32:49 -0000      1.197
+++ proprietary-insecurity.it.po        15 Jul 2021 07:33:50 -0000      1.198
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2021-07-15 06:25+0000\n"
+"POT-Creation-Date: 2021-07-15 07:26+0000\n"
 "PO-Revision-Date: 2017-12-31 13:13+0100\n"
 "Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
 "Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -156,7 +156,7 @@
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
 "A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn.";
-"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\">can allow "
+"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
 "crackers to remotely gain access to the operating system</a> and install "
 "programs, view and delete data, or even create new user accounts with full "
 "user rights."

Index: proprietary-insecurity.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ja-diff.html,v
retrieving revision 1.116
retrieving revision 1.117
diff -u -b -r1.116 -r1.117
--- proprietary-insecurity.ja-diff.html 15 Jul 2021 06:32:49 -0000      1.116
+++ proprietary-insecurity.ja-diff.html 15 Jul 2021 07:33:50 -0000      1.117
@@ -91,7 +91,11 @@
   &lt;li id="M202107090"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;A newly found Microsoft Windows vulnerability &lt;a 
href="https://edition.cnn.com/2021/07/08/tech/microsoft-windows-10-printnightmare/"&gt;can
 allow crackers to remotely gain access to the operating system&lt;/a&gt; and 
install programs, view and delete data, or even create new user 
accounts</em></ins></span> with <span class="inserted"><ins><em>full user 
rights.&lt;/p&gt;
+    &lt;p&gt;A newly found Microsoft Windows vulnerability &lt;a
+    
href="https://edition.cnn.com/2021/07/08/tech/microsoft-windows-10-printnightmare/"&gt;
+    can allow crackers to remotely gain access to the operating 
system&lt;/a&gt;
+    and install programs, view and delete data, or even create new user
+    accounts</em></ins></span> with <span class="inserted"><ins><em>full user 
rights.&lt;/p&gt;
 
     &lt;p&gt;The security research firm accidentally leaked instructions on
     how the flaw could be exploited but Windows users should still wait
@@ -329,9 +333,9 @@
   &lt;li id="M202004150"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-04&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Riot Games' new anti-cheat</em></ins></span> is <span 
class="inserted"><ins><em>malware; &lt;a
+    &lt;p&gt;Riot Games' new anti-cheat is malware; &lt;a
     
href="https://www.extremetech.com/gaming/309320-riot-games-new-anti-cheat-system-runs-at-system-boot-uses-kernel-driver"&gt;runs
-    on system boot at kernel level&lt;/a&gt; on Windows. It is insecure 
software
+    on system boot at kernel level&lt;/a&gt; on Windows. It</em></ins></span> 
is <span class="inserted"><ins><em>insecure software
     that increases the attack surface of the operating system.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -1064,17 +1068,17 @@
 
     &lt;p&gt;Depending</em></ins></span> on what drug is being infused, the 
insecurity could open
     the door to <span class="removed"><del><strong>murder.
-&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>murder.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
+&lt;/p&gt;
+&lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
+&lt;li&gt;
 &lt;p&gt;
 Due to bad security in a drug pump, crackers could use it to
 &lt;a 
href="http://www.wired.com/2015/06/hackers-can-send-fatal-doses-hospital-drug-pumps/"&gt;kill
 patients&lt;/a&gt;.
-&lt;/p&gt;
-&lt;/li&gt;
+&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>murder.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
 
-&lt;li&gt;
+<span class="removed"><del><strong>&lt;li&gt;
 &lt;p&gt;</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201504090"&gt;
@@ -1165,10 +1169,12 @@
     from the state.  Quite the contrary: confiding your data to someone
     else's server, if not first encrypted by you with free software,
     undermines your <span class="removed"><del><strong>rights.
-&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>rights.&lt;/p&gt;
+&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>rights.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201404250"&gt;
+<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201404250"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-04&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Lots of &lt;a
@@ -1181,12 +1187,10 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;The &lt;a
     
href="http://arstechnica.com/security/2014/02/crypto-weaknesses-in-whatsapp-the-kind-of-stuff-the-nsa-would-love/"&gt;insecurity
-    of WhatsApp&lt;/a&gt; makes eavesdropping a 
snap.&lt;/p&gt;</em></ins></span>
+    of WhatsApp&lt;/a&gt; makes eavesdropping a snap.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201312290"&gt;
+  &lt;li id="M201312290"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2013-12&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;</em></ins></span>
     &lt;p&gt;&lt;a href="http://www.bunniestudios.com/blog/?p=3554"&gt; Some 
flash
@@ -1371,7 +1375,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/07/15 06:32:49 $
+$Date: 2021/07/15 07:33:50 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-insecurity.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ja.po,v
retrieving revision 1.169
retrieving revision 1.170
diff -u -b -r1.169 -r1.170
--- proprietary-insecurity.ja.po        15 Jul 2021 06:32:49 -0000      1.169
+++ proprietary-insecurity.ja.po        15 Jul 2021 07:33:50 -0000      1.170
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2021-07-15 06:25+0000\n"
+"POT-Creation-Date: 2021-07-15 07:26+0000\n"
 "PO-Revision-Date: 2016-10-31 12:56+0900\n"
 "Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
 "Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -132,7 +132,7 @@
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
 "A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn.";
-"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\">can allow "
+"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
 "crackers to remotely gain access to the operating system</a> and install "
 "programs, view and delete data, or even create new user accounts with full "
 "user rights."

Index: proprietary-insecurity.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.pot,v
retrieving revision 1.135
retrieving revision 1.136
diff -u -b -r1.135 -r1.136
--- proprietary-insecurity.pot  15 Jul 2021 06:32:49 -0000      1.135
+++ proprietary-insecurity.pot  15 Jul 2021 07:33:50 -0000      1.136
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2021-07-15 06:25+0000\n"
+"POT-Creation-Date: 2021-07-15 07:26+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL@li.org>\n"
@@ -97,8 +97,8 @@
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
 "A newly found Microsoft Windows vulnerability <a "
-"href=\"https://edition.cnn.com/2021/07/08/tech/microsoft-windows-10-printnightmare/\";>can
 "
-"allow crackers to remotely gain access to the operating system</a> and "
+"href=\"https://edition.cnn.com/2021/07/08/tech/microsoft-windows-10-printnightmare/\";>
 "
+"can allow crackers to remotely gain access to the operating system</a> and "
 "install programs, view and delete data, or even create new user accounts "
 "with full user rights."
 msgstr ""

Index: proprietary-insecurity.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.pt-br.po,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -b -r1.4 -r1.5
--- proprietary-insecurity.pt-br.po     15 Jul 2021 06:32:49 -0000      1.4
+++ proprietary-insecurity.pt-br.po     15 Jul 2021 07:33:50 -0000      1.5
@@ -5,7 +5,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2021-07-15 06:25+0000\n"
+"POT-Creation-Date: 2021-07-15 07:26+0000\n"
 "PO-Revision-Date: 2021-06-26 09:40-0300\n"
 "Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
 "Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -119,7 +119,7 @@
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
 "A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn.";
-"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\">can allow "
+"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
 "crackers to remotely gain access to the operating system</a> and install "
 "programs, view and delete data, or even create new user accounts with full "
 "user rights."

Index: proprietary-insecurity.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ru.po,v
retrieving revision 1.306
retrieving revision 1.307
diff -u -b -r1.306 -r1.307
--- proprietary-insecurity.ru.po        15 Jul 2021 06:32:49 -0000      1.306
+++ proprietary-insecurity.ru.po        15 Jul 2021 07:33:50 -0000      1.307
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2021-07-15 06:25+0000\n"
+"POT-Creation-Date: 2021-07-15 07:26+0000\n"
 "PO-Revision-Date: 2020-05-25 16:59+0000\n"
 "Last-Translator: Ineiev <ineiev@gnu.org>\n"
 "Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -123,7 +123,7 @@
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
 "A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn.";
-"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\">can allow "
+"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
 "crackers to remotely gain access to the operating system</a> and install "
 "programs, view and delete data, or even create new user accounts with full "
 "user rights."

Index: proprietary-manipulation.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-manipulation.es.po,v
retrieving revision 1.36
retrieving revision 1.37
diff -u -b -r1.36 -r1.37
--- proprietary-manipulation.es.po      15 Jul 2021 06:32:49 -0000      1.36
+++ proprietary-manipulation.es.po      15 Jul 2021 07:33:50 -0000      1.37
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-manipulation.html\n"
-"POT-Creation-Date: 2021-07-15 06:25+0000\n"
+"POT-Creation-Date: 2021-07-15 07:26+0000\n"
 "PO-Revision-Date: 2021-07-08 11:07+0200\n"
 "Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
 "Language-Team: Spanish\n"
@@ -120,8 +120,8 @@
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
 "<a href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-";
-"dream-incubation\">Advertising companies are experimenting to manipulate "
-"people's minds</a> and impose a new way of advertising by altering their "
+"dream-incubation\"> Advertising companies are experimenting to manipulate "
+"people's minds</a>, and impose a new way of advertising by altering their "
 "dreams. This &ldquo;targeted dream incubation&rdquo; would trigger &ldquo;"
 "refreshing dreams&rdquo; of the product, according to the companies."
 msgstr ""

Index: proprietary-manipulation.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-manipulation.fr.po,v
retrieving revision 1.33
retrieving revision 1.34
diff -u -b -r1.33 -r1.34
--- proprietary-manipulation.fr.po      15 Jul 2021 06:32:49 -0000      1.33
+++ proprietary-manipulation.fr.po      15 Jul 2021 07:33:50 -0000      1.34
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-manipulation.html\n"
-"POT-Creation-Date: 2021-07-15 06:25+0000\n"
+"POT-Creation-Date: 2021-07-15 07:26+0000\n"
 "PO-Revision-Date: 2021-07-04 20:56+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <trad-gnu@april.org>\n"
@@ -114,8 +114,8 @@
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
 "<a href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-";
-"dream-incubation\">Advertising companies are experimenting to manipulate "
-"people's minds</a> and impose a new way of advertising by altering their "
+"dream-incubation\"> Advertising companies are experimenting to manipulate "
+"people's minds</a>, and impose a new way of advertising by altering their "
 "dreams. This &ldquo;targeted dream incubation&rdquo; would trigger &ldquo;"
 "refreshing dreams&rdquo; of the product, according to the companies."
 msgstr ""

Index: proprietary-manipulation.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-manipulation.pot,v
retrieving revision 1.18
retrieving revision 1.19
diff -u -b -r1.18 -r1.19
--- proprietary-manipulation.pot        15 Jul 2021 06:32:49 -0000      1.18
+++ proprietary-manipulation.pot        15 Jul 2021 07:33:50 -0000      1.19
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-manipulation.html\n"
-"POT-Creation-Date: 2021-07-15 06:25+0000\n"
+"POT-Creation-Date: 2021-07-15 07:26+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL@li.org>\n"
@@ -95,11 +95,11 @@
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
 "<a "
-"href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-dream-incubation\";>Advertising
 "
-"companies are experimenting to manipulate people's minds</a> and impose a "
-"new way of advertising by altering their dreams. This &ldquo;targeted dream "
-"incubation&rdquo; would trigger &ldquo;refreshing dreams&rdquo; of the "
-"product, according to the companies."
+"href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-dream-incubation\";>
 "
+"Advertising companies are experimenting to manipulate people's minds</a>, "
+"and impose a new way of advertising by altering their dreams. This "
+"&ldquo;targeted dream incubation&rdquo; would trigger &ldquo;refreshing "
+"dreams&rdquo; of the product, according to the companies."
 msgstr ""
 
 #. type: Content of: <div><div><ul><li><p>

Index: proprietary-manipulation.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-manipulation.pt-br.po,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -b -r1.4 -r1.5
--- proprietary-manipulation.pt-br.po   15 Jul 2021 06:32:49 -0000      1.4
+++ proprietary-manipulation.pt-br.po   15 Jul 2021 07:33:50 -0000      1.5
@@ -5,7 +5,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-manipulation.html\n"
-"POT-Creation-Date: 2021-07-15 06:25+0000\n"
+"POT-Creation-Date: 2021-07-15 07:26+0000\n"
 "PO-Revision-Date: 2021-06-26 09:40-0300\n"
 "Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
 "Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -112,8 +112,8 @@
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
 "<a href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-";
-"dream-incubation\">Advertising companies are experimenting to manipulate "
-"people's minds</a> and impose a new way of advertising by altering their "
+"dream-incubation\"> Advertising companies are experimenting to manipulate "
+"people's minds</a>, and impose a new way of advertising by altering their "
 "dreams. This &ldquo;targeted dream incubation&rdquo; would trigger &ldquo;"
 "refreshing dreams&rdquo; of the product, according to the companies."
 msgstr ""

Index: proprietary-manipulation.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-manipulation.ru.po,v
retrieving revision 1.26
retrieving revision 1.27
diff -u -b -r1.26 -r1.27
--- proprietary-manipulation.ru.po      15 Jul 2021 06:32:49 -0000      1.26
+++ proprietary-manipulation.ru.po      15 Jul 2021 07:33:50 -0000      1.27
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2021-07-15 06:25+0000\n"
+"POT-Creation-Date: 2021-07-15 07:26+0000\n"
 "PO-Revision-Date: 2020-05-25 16:59+0000\n"
 "Last-Translator: Ineiev <ineiev@gnu.org>\n"
 "Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -115,8 +115,8 @@
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
 "<a href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-";
-"dream-incubation\">Advertising companies are experimenting to manipulate "
-"people's minds</a> and impose a new way of advertising by altering their "
+"dream-incubation\"> Advertising companies are experimenting to manipulate "
+"people's minds</a>, and impose a new way of advertising by altering their "
 "dreams. This &ldquo;targeted dream incubation&rdquo; would trigger &ldquo;"
 "refreshing dreams&rdquo; of the product, according to the companies."
 msgstr ""

Index: proprietary.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de-diff.html,v
retrieving revision 1.285
retrieving revision 1.286
diff -u -b -r1.285 -r1.286
--- proprietary.de-diff.html    15 Jul 2021 06:32:49 -0000      1.285
+++ proprietary.de-diff.html    15 Jul 2021 07:33:50 -0000      1.286
@@ -227,7 +227,11 @@
   &lt;li id="M202107090"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;A newly found Microsoft Windows vulnerability &lt;a 
href="https://edition.cnn.com/2021/07/08/tech/microsoft-windows-10-printnightmare/"&gt;can
 allow crackers to remotely gain access to the operating system&lt;/a&gt; and 
install programs, view and delete data, or even create new user accounts with 
full user rights.&lt;/p&gt;
+    &lt;p&gt;A newly found Microsoft Windows vulnerability &lt;a
+    
href="https://edition.cnn.com/2021/07/08/tech/microsoft-windows-10-printnightmare/"&gt;
+    can allow crackers to remotely gain access to the operating 
system&lt;/a&gt;
+    and install programs, view and delete data, or even create new user
+    accounts with full user rights.&lt;/p&gt;
 
     &lt;p&gt;The security research firm accidentally leaked instructions on
     how the flaw could be exploited but Windows users should still wait
@@ -241,8 +245,13 @@
   &lt;li id="M202107050"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;&lt;a 
href="https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-dream-incubation"&gt;Advertising
-  companies are experimenting to manipulate people's minds&lt;/a&gt; and 
impose a new way of advertising by altering their dreams. This &ldquo;targeted 
dream incubation&rdquo; would trigger &ldquo;refreshing dreams&rdquo; of the 
product, according to the companies.&lt;/p&gt;
+    &lt;p&gt;&lt;a
+    
href="https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-dream-incubation"&gt;
+    Advertising companies are experimenting to manipulate people's
+    minds&lt;/a&gt;, and impose a new way of advertising by altering their
+    dreams. This &ldquo;targeted dream incubation&rdquo; would trigger
+    &ldquo;refreshing dreams&rdquo; of the product, according to the
+    companies.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M202106220"&gt;
@@ -352,7 +361,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/07/15 06:32:49 $
+$Date: 2021/07/15 07:33:50 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de.po,v
retrieving revision 1.302
retrieving revision 1.303
diff -u -b -r1.302 -r1.303
--- proprietary.de.po   15 Jul 2021 06:32:49 -0000      1.302
+++ proprietary.de.po   15 Jul 2021 07:33:50 -0000      1.303
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
 "Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2021-07-15 06:25+0000\n"
+"POT-Creation-Date: 2021-07-15 07:26+0000\n"
 "PO-Revision-Date: 2018-04-12 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <www-de-translators@gnu.org>\n"
@@ -481,7 +481,7 @@
 #. type: Content of: <div><ul><li><p>
 msgid ""
 "A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn.";
-"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\">can allow "
+"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
 "crackers to remotely gain access to the operating system</a> and install "
 "programs, view and delete data, or even create new user accounts with full "
 "user rights."
@@ -515,8 +515,8 @@
 #. type: Content of: <div><ul><li><p>
 msgid ""
 "<a href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-";
-"dream-incubation\">Advertising companies are experimenting to manipulate "
-"people's minds</a> and impose a new way of advertising by altering their "
+"dream-incubation\"> Advertising companies are experimenting to manipulate "
+"people's minds</a>, and impose a new way of advertising by altering their "
 "dreams. This &ldquo;targeted dream incubation&rdquo; would trigger &ldquo;"
 "refreshing dreams&rdquo; of the product, according to the companies."
 msgstr ""

Index: proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.487
retrieving revision 1.488
diff -u -b -r1.487 -r1.488
--- proprietary.es.po   15 Jul 2021 06:32:49 -0000      1.487
+++ proprietary.es.po   15 Jul 2021 07:33:50 -0000      1.488
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-07-15 06:25+0000\n"
+"POT-Creation-Date: 2021-07-15 07:26+0000\n"
 "PO-Revision-Date: \n"
 "Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
 "Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -352,7 +352,7 @@
 #. type: Content of: <div><ul><li><p>
 msgid ""
 "A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn.";
-"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\">can allow "
+"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
 "crackers to remotely gain access to the operating system</a> and install "
 "programs, view and delete data, or even create new user accounts with full "
 "user rights."
@@ -387,8 +387,8 @@
 #. type: Content of: <div><ul><li><p>
 msgid ""
 "<a href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-";
-"dream-incubation\">Advertising companies are experimenting to manipulate "
-"people's minds</a> and impose a new way of advertising by altering their "
+"dream-incubation\"> Advertising companies are experimenting to manipulate "
+"people's minds</a>, and impose a new way of advertising by altering their "
 "dreams. This &ldquo;targeted dream incubation&rdquo; would trigger &ldquo;"
 "refreshing dreams&rdquo; of the product, according to the companies."
 msgstr ""

Index: proprietary.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr.po,v
retrieving revision 1.514
retrieving revision 1.515
diff -u -b -r1.514 -r1.515
--- proprietary.fr.po   15 Jul 2021 06:32:49 -0000      1.514
+++ proprietary.fr.po   15 Jul 2021 07:33:51 -0000      1.515
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-07-15 06:25+0000\n"
+"POT-Creation-Date: 2021-07-15 07:26+0000\n"
 "PO-Revision-Date: 2021-07-04 09:19+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <trad-gnu@april.org>\n"
@@ -349,7 +349,7 @@
 #. type: Content of: <div><ul><li><p>
 msgid ""
 "A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn.";
-"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\">can allow "
+"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
 "crackers to remotely gain access to the operating system</a> and install "
 "programs, view and delete data, or even create new user accounts with full "
 "user rights."
@@ -373,8 +373,8 @@
 #. type: Content of: <div><ul><li><p>
 msgid ""
 "<a href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-";
-"dream-incubation\">Advertising companies are experimenting to manipulate "
-"people's minds</a> and impose a new way of advertising by altering their "
+"dream-incubation\"> Advertising companies are experimenting to manipulate "
+"people's minds</a>, and impose a new way of advertising by altering their "
 "dreams. This &ldquo;targeted dream incubation&rdquo; would trigger &ldquo;"
 "refreshing dreams&rdquo; of the product, according to the companies."
 msgstr ""

Index: proprietary.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it-diff.html,v
retrieving revision 1.295
retrieving revision 1.296
diff -u -b -r1.295 -r1.296
--- proprietary.it-diff.html    15 Jul 2021 06:32:49 -0000      1.295
+++ proprietary.it-diff.html    15 Jul 2021 07:33:51 -0000      1.296
@@ -58,16 +58,16 @@
 <span class="removed"><del><strong>div.toc</strong></del></span>
 <span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span> 
list-style: none; <span class="removed"><del><strong>margin-bottom: 
1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
-<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%; }
 #TOC a, #TOC a:visited,
  #skiplinks a, #skiplinks a:visited {
    color: #004caa;
    text-decoration: none;
 }
-#TOC a { text-decoration: none; }
-#TOC a:hover { text-decoration: underline; }
+#TOC a</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>text-decoration: 
none;</em></ins></span> }
+<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
+<span class="inserted"><ins><em>#TOC a:hover { text-decoration: underline; }
 --&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
@@ -137,19 +137,19 @@
  &lt;/tr&gt;
  &lt;tr&gt;
   &lt;td&gt;
-   &lt;ul class="columns"&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-apple.html"&gt;Apple 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html"&gt;Addictions&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&nbsp;(&lt;a href="#f1"&gt;1&lt;/a&gt;)&lt;/li&gt;
+   &lt;ul class="columns"&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-addictions.html"&gt;Addictions&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-apple.html"&gt;Apple 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&nbsp;(&lt;a href="#f1"&gt;1&lt;/a&gt;)&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-google.html"&gt;Google 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-amazon.html"&gt;Amazon 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html"&gt;DRM&lt;/a&gt;&nbsp;(&lt;a
 href="#f2"&gt;2&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-webpages.html"&gt;Malware
 in webpages&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html"&gt;Fraud&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-mobiles.html"&gt;Malware
 in mobile devices&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-cars.html"&gt;Malware 
in cars&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html"&gt;Jails&lt;/a&gt;&nbsp;(&lt;a
 href="#f3"&gt;3&lt;/a&gt;)&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-manipulation.html"&gt;Manipulation&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-google.html"&gt;Google 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html"&gt;DRM&lt;/a&gt;&nbsp;(&lt;a
 href="#f2"&gt;2&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-amazon.html"&gt;Amazon 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html"&gt;Fraud&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-webpages.html"&gt;Malware
 in webpages&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-mobiles.html"&gt;Malware
 in mobile devices&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html"&gt;Jails&lt;/a&gt;&nbsp;(&lt;a
 href="#f3"&gt;3&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-cars.html"&gt;Malware 
in cars&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-manipulation.html"&gt;Manipulation&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-obsolescence.html"&gt;Obsolescence&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-subscriptions.html"&gt;Subscriptions&lt;/a&gt;&lt;/li&gt;
@@ -226,7 +226,11 @@
   &lt;li id="M202107090"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;A newly found Microsoft Windows vulnerability &lt;a 
href="https://edition.cnn.com/2021/07/08/tech/microsoft-windows-10-printnightmare/"&gt;can
 allow crackers to remotely gain access to the operating system&lt;/a&gt; and 
install programs, view and delete data, or even create new user accounts with 
full user rights.&lt;/p&gt;
+    &lt;p&gt;A newly found Microsoft Windows vulnerability &lt;a
+    
href="https://edition.cnn.com/2021/07/08/tech/microsoft-windows-10-printnightmare/"&gt;
+    can allow crackers to remotely gain access to the operating 
system&lt;/a&gt;
+    and install programs, view and delete data, or even create new user
+    accounts with full user rights.&lt;/p&gt;
 
     &lt;p&gt;The security research firm accidentally leaked instructions on
     how the flaw could be exploited but Windows users should still wait
@@ -240,8 +244,13 @@
   &lt;li id="M202107050"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;&lt;a 
href="https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-dream-incubation"&gt;Advertising
-  companies are experimenting to manipulate people's minds&lt;/a&gt; and 
impose a new way of advertising by altering their dreams. This &ldquo;targeted 
dream incubation&rdquo; would trigger &ldquo;refreshing dreams&rdquo; of the 
product, according to the companies.&lt;/p&gt;
+    &lt;p&gt;&lt;a
+    
href="https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-dream-incubation"&gt;
+    Advertising companies are experimenting to manipulate people's
+    minds&lt;/a&gt;, and impose a new way of advertising by altering their
+    dreams. This &ldquo;targeted dream incubation&rdquo; would trigger
+    &ldquo;refreshing dreams&rdquo; of the product, according to the
+    companies.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M202106220"&gt;
@@ -351,7 +360,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/07/15 06:32:49 $
+$Date: 2021/07/15 07:33:51 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it.po,v
retrieving revision 1.311
retrieving revision 1.312
diff -u -b -r1.311 -r1.312
--- proprietary.it.po   15 Jul 2021 06:32:49 -0000      1.311
+++ proprietary.it.po   15 Jul 2021 07:33:51 -0000      1.312
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-07-15 06:25+0000\n"
+"POT-Creation-Date: 2021-07-15 07:26+0000\n"
 "PO-Revision-Date: 2018-02-01 21:32+0100\n"
 "Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
 "Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -486,7 +486,7 @@
 #. type: Content of: <div><ul><li><p>
 msgid ""
 "A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn.";
-"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\">can allow "
+"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
 "crackers to remotely gain access to the operating system</a> and install "
 "programs, view and delete data, or even create new user accounts with full "
 "user rights."
@@ -508,8 +508,8 @@
 #. type: Content of: <div><ul><li><p>
 msgid ""
 "<a href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-";
-"dream-incubation\">Advertising companies are experimenting to manipulate "
-"people's minds</a> and impose a new way of advertising by altering their "
+"dream-incubation\"> Advertising companies are experimenting to manipulate "
+"people's minds</a>, and impose a new way of advertising by altering their "
 "dreams. This &ldquo;targeted dream incubation&rdquo; would trigger &ldquo;"
 "refreshing dreams&rdquo; of the product, according to the companies."
 msgstr ""

Index: proprietary.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja-diff.html,v
retrieving revision 1.300
retrieving revision 1.301
diff -u -b -r1.300 -r1.301
--- proprietary.ja-diff.html    15 Jul 2021 06:32:49 -0000      1.300
+++ proprietary.ja-diff.html    15 Jul 2021 07:33:51 -0000      1.301
@@ -129,7 +129,8 @@
   &lt;li&gt;&lt;a href="/proprietary/malware-mobiles.html"&gt;Malware in 
mobile devices&lt;/a&gt;&lt;/li&gt;
   &lt;li&gt;&lt;a href="/proprietary/malware-kindle-swindle.html"&gt;Malware 
in</strong></del></span> <span class="inserted"><ins><em>make other changes,
 subscribe to</em></ins></span> the <span class="removed"><del><strong>Amazon
-      Swindle&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+      Swindle&lt;/a&gt;&lt;/li&gt;
+  &lt;li&gt;&lt;a href="/proprietary/malware-games.html"&gt;Malware in 
games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
 href="https://lists.gnu.org/mailman/listinfo/www-malware-commits"&gt;mailing 
list
 &lt;www-malware-commits@gnu.org&gt;&lt;/a&gt;.&lt;/p&gt;
 
@@ -141,8 +142,7 @@
  &lt;tr&gt;
   &lt;td&gt;
    &lt;ul class="columns"&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;
-  &lt;li&gt;&lt;a href="/proprietary/malware-appliances.html"&gt;Malware in 
appliances&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;
 &lt;/ul&gt;
 &lt;/div&gt;
 
@@ -182,9 +182,9 @@
    &lt;ul&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-drm.html"&gt;Digital</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-microsoft.html"&gt;Microsoft&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-drm.html"&gt;Digital</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html"&gt;Microsoft&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
   &lt;/td&gt;
  &lt;/tr&gt;
@@ -205,10 +205,10 @@
      application programs.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span>
 
-    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality that requires
+    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality</em></ins></span> 
that <span class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>requires
      permanent (or very frequent) connection to a server.&lt;/li&gt;
 
-    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; 
system</em></ins></span> that <span 
class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>rejects</em></ins></span> any operating
+    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; system that 
rejects</em></ins></span> any operating
      system not &ldquo;authorized&rdquo; by the manufacturer.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;/ul&gt;
 &lt;/div&gt;
@@ -231,7 +231,11 @@
   &lt;li id="M202107090"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;A newly found Microsoft Windows vulnerability &lt;a 
href="https://edition.cnn.com/2021/07/08/tech/microsoft-windows-10-printnightmare/"&gt;can
 allow crackers to remotely gain access to the operating system&lt;/a&gt; and 
install programs, view and delete data, or even create new user accounts with 
full user rights.&lt;/p&gt;
+    &lt;p&gt;A newly found Microsoft Windows vulnerability &lt;a
+    
href="https://edition.cnn.com/2021/07/08/tech/microsoft-windows-10-printnightmare/"&gt;
+    can allow crackers to remotely gain access to the operating 
system&lt;/a&gt;
+    and install programs, view and delete data, or even create new user
+    accounts with full user rights.&lt;/p&gt;
 
     &lt;p&gt;The security research firm accidentally leaked instructions on
     how the flaw could be exploited but Windows users should still wait
@@ -245,8 +249,13 @@
   &lt;li id="M202107050"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;&lt;a 
href="https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-dream-incubation"&gt;Advertising
-  companies are experimenting to manipulate people's minds&lt;/a&gt; and 
impose a new way of advertising by altering their dreams. This &ldquo;targeted 
dream incubation&rdquo; would trigger &ldquo;refreshing dreams&rdquo; of the 
product, according to the companies.&lt;/p&gt;
+    &lt;p&gt;&lt;a
+    
href="https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-dream-incubation"&gt;
+    Advertising companies are experimenting to manipulate people's
+    minds&lt;/a&gt;, and impose a new way of advertising by altering their
+    dreams. This &ldquo;targeted dream incubation&rdquo; would trigger
+    &ldquo;refreshing dreams&rdquo; of the product, according to the
+    companies.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M202106220"&gt;
@@ -356,7 +365,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/07/15 06:32:49 $
+$Date: 2021/07/15 07:33:51 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja.po,v
retrieving revision 1.294
retrieving revision 1.295
diff -u -b -r1.294 -r1.295
--- proprietary.ja.po   15 Jul 2021 06:32:49 -0000      1.294
+++ proprietary.ja.po   15 Jul 2021 07:33:51 -0000      1.295
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-07-15 06:25+0000\n"
+"POT-Creation-Date: 2021-07-15 07:26+0000\n"
 "PO-Revision-Date: 2017-01-11 11:25+0900\n"
 "Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
 "Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -344,7 +344,7 @@
 #. type: Content of: <div><ul><li><p>
 msgid ""
 "A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn.";
-"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\">can allow "
+"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
 "crackers to remotely gain access to the operating system</a> and install "
 "programs, view and delete data, or even create new user accounts with full "
 "user rights."
@@ -366,8 +366,8 @@
 #. type: Content of: <div><ul><li><p>
 msgid ""
 "<a href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-";
-"dream-incubation\">Advertising companies are experimenting to manipulate "
-"people's minds</a> and impose a new way of advertising by altering their "
+"dream-incubation\"> Advertising companies are experimenting to manipulate "
+"people's minds</a>, and impose a new way of advertising by altering their "
 "dreams. This &ldquo;targeted dream incubation&rdquo; would trigger &ldquo;"
 "refreshing dreams&rdquo; of the product, according to the companies."
 msgstr ""

Index: proprietary.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl-diff.html,v
retrieving revision 1.296
retrieving revision 1.297
diff -u -b -r1.296 -r1.297
--- proprietary.nl-diff.html    15 Jul 2021 06:32:49 -0000      1.296
+++ proprietary.nl-diff.html    15 Jul 2021 07:33:51 -0000      1.297
@@ -58,16 +58,16 @@
 <span class="removed"><del><strong>div.toc</strong></del></span>
 <span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span> 
list-style: none; <span class="removed"><del><strong>margin-bottom: 
1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
-<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%; }
 #TOC a, #TOC a:visited,
  #skiplinks a, #skiplinks a:visited {
    color: #004caa;
    text-decoration: none;
 }
-#TOC a { text-decoration: none; }
-#TOC a:hover { text-decoration: underline; }
+#TOC a</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>text-decoration: 
none;</em></ins></span> }
+<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
+<span class="inserted"><ins><em>#TOC a:hover { text-decoration: underline; }
 --&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
@@ -140,16 +140,16 @@
    &lt;ul class="columns"&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-apple.html"&gt;Apple 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html"&gt;Addictions&lt;/a&gt;&lt;/li&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&nbsp;(&lt;a 
href="#f1"&gt;1&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-google.html"&gt;Google 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-amazon.html"&gt;Amazon 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-webpages.html"&gt;Malware
 in webpages&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html"&gt;DRM&lt;/a&gt;&nbsp;(&lt;a
 href="#f2"&gt;2&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-phones.html"&gt;Malware 
in phones&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html"&gt;Fraud&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-mobiles.html"&gt;Malware
 in mobile devices&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-cars.html"&gt;Malware 
in cars&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html"&gt;Jails&lt;/a&gt;&nbsp;(&lt;a
 href="#f3"&gt;3&lt;/a&gt;)&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-manipulation.html"&gt;Manipulation&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-google.html"&gt;Google 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-amazon.html"&gt;Amazon 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html"&gt;DRM&lt;/a&gt;&nbsp;(&lt;a
 href="#f2"&gt;2&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-webpages.html"&gt;Malware
 in webpages&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html"&gt;Fraud&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-phones.html"&gt;Malware 
in phones&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-mobiles.html"&gt;Malware
 in mobile devices&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html"&gt;Jails&lt;/a&gt;&nbsp;(&lt;a
 href="#f3"&gt;3&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-cars.html"&gt;Malware 
in cars&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-manipulation.html"&gt;Manipulation&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-obsolescence.html"&gt;Obsolescence&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-subscriptions.html"&gt;Subscriptions&lt;/a&gt;&lt;/li&gt;
@@ -226,7 +226,11 @@
   &lt;li id="M202107090"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;A newly found Microsoft Windows vulnerability &lt;a 
href="https://edition.cnn.com/2021/07/08/tech/microsoft-windows-10-printnightmare/"&gt;can
 allow crackers to remotely gain access to the operating system&lt;/a&gt; and 
install programs, view and delete data, or even create new user accounts with 
full user rights.&lt;/p&gt;
+    &lt;p&gt;A newly found Microsoft Windows vulnerability &lt;a
+    
href="https://edition.cnn.com/2021/07/08/tech/microsoft-windows-10-printnightmare/"&gt;
+    can allow crackers to remotely gain access to the operating 
system&lt;/a&gt;
+    and install programs, view and delete data, or even create new user
+    accounts with full user rights.&lt;/p&gt;
 
     &lt;p&gt;The security research firm accidentally leaked instructions on
     how the flaw could be exploited but Windows users should still wait
@@ -240,8 +244,13 @@
   &lt;li id="M202107050"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;&lt;a 
href="https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-dream-incubation"&gt;Advertising
-  companies are experimenting to manipulate people's minds&lt;/a&gt; and 
impose a new way of advertising by altering their dreams. This &ldquo;targeted 
dream incubation&rdquo; would trigger &ldquo;refreshing dreams&rdquo; of the 
product, according to the companies.&lt;/p&gt;
+    &lt;p&gt;&lt;a
+    
href="https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-dream-incubation"&gt;
+    Advertising companies are experimenting to manipulate people's
+    minds&lt;/a&gt;, and impose a new way of advertising by altering their
+    dreams. This &ldquo;targeted dream incubation&rdquo; would trigger
+    &ldquo;refreshing dreams&rdquo; of the product, according to the
+    companies.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M202106220"&gt;
@@ -351,7 +360,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/07/15 06:32:49 $
+$Date: 2021/07/15 07:33:51 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl.po,v
retrieving revision 1.285
retrieving revision 1.286
diff -u -b -r1.285 -r1.286
--- proprietary.nl.po   15 Jul 2021 06:32:49 -0000      1.285
+++ proprietary.nl.po   15 Jul 2021 07:33:51 -0000      1.286
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-07-15 06:25+0000\n"
+"POT-Creation-Date: 2021-07-15 07:26+0000\n"
 "PO-Revision-Date: 2017-11-24 22:20+0100\n"
 "Last-Translator: Justin van Steijn <jvs@fsfe.org>\n"
 "Language-Team: Dutch <www-nl-translators@gnu.org>\n"
@@ -389,7 +389,7 @@
 #. type: Content of: <div><ul><li><p>
 msgid ""
 "A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn.";
-"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\">can allow "
+"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
 "crackers to remotely gain access to the operating system</a> and install "
 "programs, view and delete data, or even create new user accounts with full "
 "user rights."
@@ -411,8 +411,8 @@
 #. type: Content of: <div><ul><li><p>
 msgid ""
 "<a href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-";
-"dream-incubation\">Advertising companies are experimenting to manipulate "
-"people's minds</a> and impose a new way of advertising by altering their "
+"dream-incubation\"> Advertising companies are experimenting to manipulate "
+"people's minds</a>, and impose a new way of advertising by altering their "
 "dreams. This &ldquo;targeted dream incubation&rdquo; would trigger &ldquo;"
 "refreshing dreams&rdquo; of the product, according to the companies."
 msgstr ""

Index: proprietary.pl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl-diff.html,v
retrieving revision 1.312
retrieving revision 1.313
diff -u -b -r1.312 -r1.313
--- proprietary.pl-diff.html    15 Jul 2021 06:32:49 -0000      1.312
+++ proprietary.pl-diff.html    15 Jul 2021 07:33:51 -0000      1.313
@@ -225,7 +225,11 @@
   &lt;li id="M202107090"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;A newly found Microsoft Windows vulnerability &lt;a 
href="https://edition.cnn.com/2021/07/08/tech/microsoft-windows-10-printnightmare/"&gt;can
 allow crackers to remotely gain access to the operating system&lt;/a&gt; and 
install programs, view and delete data, or even create new user accounts with 
full user rights.&lt;/p&gt;
+    &lt;p&gt;A newly found Microsoft Windows vulnerability &lt;a
+    
href="https://edition.cnn.com/2021/07/08/tech/microsoft-windows-10-printnightmare/"&gt;
+    can allow crackers to remotely gain access to the operating 
system&lt;/a&gt;
+    and install programs, view and delete data, or even create new user
+    accounts with full user rights.&lt;/p&gt;
 
     &lt;p&gt;The security research firm accidentally leaked instructions on
     how the flaw could be exploited but Windows users should still wait
@@ -239,8 +243,13 @@
   &lt;li id="M202107050"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;&lt;a 
href="https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-dream-incubation"&gt;Advertising
-  companies are experimenting to manipulate people's minds&lt;/a&gt; and 
impose a new way of advertising by altering their dreams. This &ldquo;targeted 
dream incubation&rdquo; would trigger &ldquo;refreshing dreams&rdquo; of the 
product, according to the companies.&lt;/p&gt;
+    &lt;p&gt;&lt;a
+    
href="https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-dream-incubation"&gt;
+    Advertising companies are experimenting to manipulate people's
+    minds&lt;/a&gt;, and impose a new way of advertising by altering their
+    dreams. This &ldquo;targeted dream incubation&rdquo; would trigger
+    &ldquo;refreshing dreams&rdquo; of the product, according to the
+    companies.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M202106220"&gt;
@@ -350,7 +359,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/07/15 06:32:49 $
+$Date: 2021/07/15 07:33:51 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl.po,v
retrieving revision 1.277
retrieving revision 1.278
diff -u -b -r1.277 -r1.278
--- proprietary.pl.po   15 Jul 2021 06:32:49 -0000      1.277
+++ proprietary.pl.po   15 Jul 2021 07:33:51 -0000      1.278
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-07-15 06:25+0000\n"
+"POT-Creation-Date: 2021-07-15 07:26+0000\n"
 "PO-Revision-Date: 2015-07-31 20:51-0600\n"
 "Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
 "Language-Team: Polish <www-pl-trans@gnu.org>\n"
@@ -570,7 +570,7 @@
 #. type: Content of: <div><ul><li><p>
 msgid ""
 "A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn.";
-"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\">can allow "
+"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
 "crackers to remotely gain access to the operating system</a> and install "
 "programs, view and delete data, or even create new user accounts with full "
 "user rights."
@@ -592,8 +592,8 @@
 #. type: Content of: <div><ul><li><p>
 msgid ""
 "<a href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-";
-"dream-incubation\">Advertising companies are experimenting to manipulate "
-"people's minds</a> and impose a new way of advertising by altering their "
+"dream-incubation\"> Advertising companies are experimenting to manipulate "
+"people's minds</a>, and impose a new way of advertising by altering their "
 "dreams. This &ldquo;targeted dream incubation&rdquo; would trigger &ldquo;"
 "refreshing dreams&rdquo; of the product, according to the companies."
 msgstr ""

Index: proprietary.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pot,v
retrieving revision 1.274
retrieving revision 1.275
diff -u -b -r1.274 -r1.275
--- proprietary.pot     15 Jul 2021 06:32:49 -0000      1.274
+++ proprietary.pot     15 Jul 2021 07:33:51 -0000      1.275
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-07-15 06:25+0000\n"
+"POT-Creation-Date: 2021-07-15 07:26+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL@li.org>\n"
@@ -281,8 +281,8 @@
 #. type: Content of: <div><ul><li><p>
 msgid ""
 "A newly found Microsoft Windows vulnerability <a "
-"href=\"https://edition.cnn.com/2021/07/08/tech/microsoft-windows-10-printnightmare/\";>can
 "
-"allow crackers to remotely gain access to the operating system</a> and "
+"href=\"https://edition.cnn.com/2021/07/08/tech/microsoft-windows-10-printnightmare/\";>
 "
+"can allow crackers to remotely gain access to the operating system</a> and "
 "install programs, view and delete data, or even create new user accounts "
 "with full user rights."
 msgstr ""
@@ -303,11 +303,11 @@
 #. type: Content of: <div><ul><li><p>
 msgid ""
 "<a "
-"href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-dream-incubation\";>Advertising
 "
-"companies are experimenting to manipulate people's minds</a> and impose a "
-"new way of advertising by altering their dreams. This &ldquo;targeted dream "
-"incubation&rdquo; would trigger &ldquo;refreshing dreams&rdquo; of the "
-"product, according to the companies."
+"href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-dream-incubation\";>
 "
+"Advertising companies are experimenting to manipulate people's minds</a>, "
+"and impose a new way of advertising by altering their dreams. This "
+"&ldquo;targeted dream incubation&rdquo; would trigger &ldquo;refreshing "
+"dreams&rdquo; of the product, according to the companies."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>

Index: proprietary.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br.po,v
retrieving revision 1.437
retrieving revision 1.438
diff -u -b -r1.437 -r1.438
--- proprietary.pt-br.po        15 Jul 2021 06:32:49 -0000      1.437
+++ proprietary.pt-br.po        15 Jul 2021 07:33:51 -0000      1.438
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-07-15 06:25+0000\n"
+"POT-Creation-Date: 2021-07-15 07:26+0000\n"
 "PO-Revision-Date: 2021-06-13 12:11-0300\n"
 "Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
 "Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -342,7 +342,7 @@
 #. type: Content of: <div><ul><li><p>
 msgid ""
 "A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn.";
-"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\">can allow "
+"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
 "crackers to remotely gain access to the operating system</a> and install "
 "programs, view and delete data, or even create new user accounts with full "
 "user rights."
@@ -367,8 +367,8 @@
 #. type: Content of: <div><ul><li><p>
 msgid ""
 "<a href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-";
-"dream-incubation\">Advertising companies are experimenting to manipulate "
-"people's minds</a> and impose a new way of advertising by altering their "
+"dream-incubation\"> Advertising companies are experimenting to manipulate "
+"people's minds</a>, and impose a new way of advertising by altering their "
 "dreams. This &ldquo;targeted dream incubation&rdquo; would trigger &ldquo;"
 "refreshing dreams&rdquo; of the product, according to the companies."
 msgstr ""

Index: proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.533
retrieving revision 1.534
diff -u -b -r1.533 -r1.534
--- proprietary.ru.po   15 Jul 2021 06:32:49 -0000      1.533
+++ proprietary.ru.po   15 Jul 2021 07:33:51 -0000      1.534
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2021-07-15 06:25+0000\n"
+"POT-Creation-Date: 2021-07-15 07:26+0000\n"
 "PO-Revision-Date: 2020-05-25 16:59+0000\n"
 "Last-Translator: Ineiev <ineiev@gnu.org>\n"
 "Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -351,7 +351,7 @@
 #. type: Content of: <div><ul><li><p>
 msgid ""
 "A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn.";
-"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\">can allow "
+"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
 "crackers to remotely gain access to the operating system</a> and install "
 "programs, view and delete data, or even create new user accounts with full "
 "user rights."
@@ -376,8 +376,8 @@
 #. type: Content of: <div><ul><li><p>
 msgid ""
 "<a href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-";
-"dream-incubation\">Advertising companies are experimenting to manipulate "
-"people's minds</a> and impose a new way of advertising by altering their "
+"dream-incubation\"> Advertising companies are experimenting to manipulate "
+"people's minds</a>, and impose a new way of advertising by altering their "
 "dreams. This &ldquo;targeted dream incubation&rdquo; would trigger &ldquo;"
 "refreshing dreams&rdquo; of the product, according to the companies."
 msgstr ""

Index: proprietary.tr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.tr.po,v
retrieving revision 1.181
retrieving revision 1.182
diff -u -b -r1.181 -r1.182
--- proprietary.tr.po   15 Jul 2021 06:32:49 -0000      1.181
+++ proprietary.tr.po   15 Jul 2021 07:33:51 -0000      1.182
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-07-15 06:25+0000\n"
+"POT-Creation-Date: 2021-07-15 07:26+0000\n"
 "PO-Revision-Date: 2021-07-11 08:10+0200\n"
 "Last-Translator: T. E. Kalayci <tekrei@member.fsf.org>\n"
 "Language-Team: Turkish <www-tr-comm@gnu.org>\n"
@@ -343,7 +343,7 @@
 #. type: Content of: <div><ul><li><p>
 msgid ""
 "A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn.";
-"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\">can allow "
+"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
 "crackers to remotely gain access to the operating system</a> and install "
 "programs, view and delete data, or even create new user accounts with full "
 "user rights."
@@ -368,8 +368,8 @@
 #. type: Content of: <div><ul><li><p>
 msgid ""
 "<a href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-";
-"dream-incubation\">Advertising companies are experimenting to manipulate "
-"people's minds</a> and impose a new way of advertising by altering their "
+"dream-incubation\"> Advertising companies are experimenting to manipulate "
+"people's minds</a>, and impose a new way of advertising by altering their "
 "dreams. This &ldquo;targeted dream incubation&rdquo; would trigger &ldquo;"
 "refreshing dreams&rdquo; of the product, according to the companies."
 msgstr ""

Index: proprietary.zh-cn.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-cn.po,v
retrieving revision 1.230
retrieving revision 1.231
diff -u -b -r1.230 -r1.231
--- proprietary.zh-cn.po        15 Jul 2021 06:32:49 -0000      1.230
+++ proprietary.zh-cn.po        15 Jul 2021 07:33:51 -0000      1.231
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-07-15 06:25+0000\n"
+"POT-Creation-Date: 2021-07-15 07:26+0000\n"
 "PO-Revision-Date: 2021-07-06 17:00+0800\n"
 "Last-Translator: Wensheng Xie <wxie@member.fsf.org>\n"
 "Language-Team: CTT <www-zh-cn-translators@gnu.org>\n"
@@ -322,7 +322,7 @@
 #. type: Content of: <div><ul><li><p>
 msgid ""
 "A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn.";
-"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\">can allow "
+"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
 "crackers to remotely gain access to the operating system</a> and install "
 "programs, view and delete data, or even create new user accounts with full "
 "user rights."
@@ -346,8 +346,8 @@
 #. type: Content of: <div><ul><li><p>
 msgid ""
 "<a href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-";
-"dream-incubation\">Advertising companies are experimenting to manipulate "
-"people's minds</a> and impose a new way of advertising by altering their "
+"dream-incubation\"> Advertising companies are experimenting to manipulate "
+"people's minds</a>, and impose a new way of advertising by altering their "
 "dreams. This &ldquo;targeted dream incubation&rdquo; would trigger &ldquo;"
 "refreshing dreams&rdquo; of the product, according to the companies."
 msgstr ""

Index: proprietary.zh-tw-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw-diff.html,v
retrieving revision 1.275
retrieving revision 1.276
diff -u -b -r1.275 -r1.276
--- proprietary.zh-tw-diff.html 15 Jul 2021 06:32:49 -0000      1.275
+++ proprietary.zh-tw-diff.html 15 Jul 2021 07:33:51 -0000      1.276
@@ -227,7 +227,11 @@
   &lt;li id="M202107090"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;A newly found Microsoft Windows vulnerability &lt;a 
href="https://edition.cnn.com/2021/07/08/tech/microsoft-windows-10-printnightmare/"&gt;can
 allow crackers to remotely gain access to the operating system&lt;/a&gt; and 
install programs, view and delete data, or even create new user accounts with 
full user rights.&lt;/p&gt;
+    &lt;p&gt;A newly found Microsoft Windows vulnerability &lt;a
+    
href="https://edition.cnn.com/2021/07/08/tech/microsoft-windows-10-printnightmare/"&gt;
+    can allow crackers to remotely gain access to the operating 
system&lt;/a&gt;
+    and install programs, view and delete data, or even create new user
+    accounts with full user rights.&lt;/p&gt;
 
     &lt;p&gt;The security research firm accidentally leaked instructions on
     how the flaw could be exploited but Windows users should still wait
@@ -241,8 +245,13 @@
   &lt;li id="M202107050"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;&lt;a 
href="https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-dream-incubation"&gt;Advertising
-  companies are experimenting to manipulate people's minds&lt;/a&gt; and 
impose a new way of advertising by altering their dreams. This &ldquo;targeted 
dream incubation&rdquo; would trigger &ldquo;refreshing dreams&rdquo; of the 
product, according to the companies.&lt;/p&gt;
+    &lt;p&gt;&lt;a
+    
href="https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-dream-incubation"&gt;
+    Advertising companies are experimenting to manipulate people's
+    minds&lt;/a&gt;, and impose a new way of advertising by altering their
+    dreams. This &ldquo;targeted dream incubation&rdquo; would trigger
+    &ldquo;refreshing dreams&rdquo; of the product, according to the
+    companies.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M202106220"&gt;
@@ -352,7 +361,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/07/15 06:32:49 $
+$Date: 2021/07/15 07:33:51 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw.po,v
retrieving revision 1.264
retrieving revision 1.265
diff -u -b -r1.264 -r1.265
--- proprietary.zh-tw.po        15 Jul 2021 06:32:49 -0000      1.264
+++ proprietary.zh-tw.po        15 Jul 2021 07:33:51 -0000      1.265
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-07-15 06:25+0000\n"
+"POT-Creation-Date: 2021-07-15 07:26+0000\n"
 "PO-Revision-Date: 2020-02-08 17:12+0800\n"
 "Last-Translator: Cheng-Chia Tseng <pswo10680@gmail.com>\n"
 "Language-Team: Traditional Chinese <www-zh-tw-translators@gnu.org>\n"
@@ -459,7 +459,7 @@
 #. type: Content of: <div><ul><li><p>
 msgid ""
 "A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn.";
-"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\">can allow "
+"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
 "crackers to remotely gain access to the operating system</a> and install "
 "programs, view and delete data, or even create new user accounts with full "
 "user rights."
@@ -481,8 +481,8 @@
 #. type: Content of: <div><ul><li><p>
 msgid ""
 "<a href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-";
-"dream-incubation\">Advertising companies are experimenting to manipulate "
-"people's minds</a> and impose a new way of advertising by altering their "
+"dream-incubation\"> Advertising companies are experimenting to manipulate "
+"people's minds</a>, and impose a new way of advertising by altering their "
 "dreams. This &ldquo;targeted dream incubation&rdquo; would trigger &ldquo;"
 "refreshing dreams&rdquo; of the product, according to the companies."
 msgstr ""

Index: pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/pt-br.po,v
retrieving revision 1.406
retrieving revision 1.407
diff -u -b -r1.406 -r1.407
--- pt-br.po    15 Jul 2021 06:32:49 -0000      1.406
+++ pt-br.po    15 Jul 2021 07:33:51 -0000      1.407
@@ -509,7 +509,7 @@
 #. type: Content of: <div><ul><li><p>
 msgid ""
 "A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn.";
-"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\">can allow "
+"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
 "crackers to remotely gain access to the operating system</a> and install "
 "programs, view and delete data, or even create new user accounts with full "
 "user rights."
@@ -534,8 +534,8 @@
 #. type: Content of: <div><ul><li><p>
 msgid ""
 "<a href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-";
-"dream-incubation\">Advertising companies are experimenting to manipulate "
-"people's minds</a> and impose a new way of advertising by altering their "
+"dream-incubation\"> Advertising companies are experimenting to manipulate "
+"people's minds</a>, and impose a new way of advertising by altering their "
 "dreams. This &ldquo;targeted dream incubation&rdquo; would trigger &ldquo;"
 "refreshing dreams&rdquo; of the product, according to the companies."
 msgstr ""
@@ -6005,12 +6005,19 @@
 msgstr "Censura privativa"
 
 #. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "One kind of malicious functionality is censorship of what users can "
+#| "access.  Here are examples of programs which do this.  We have a <a href="
+#| "\"/proprietary/proprietary-jails.html#about-page\">separate list of "
+#| "proprietary systems that censor installation</a> of application programs "
+#| "(we call them &ldquo;jails&rdquo;)."
 msgid ""
 "One kind of malicious functionality is censorship of what users can access.  "
 "Here are examples of programs which do this.  We have a <a href=\"/"
-"proprietary/proprietary-jails.html#about-page\">separate list of proprietary "
-"systems that censor installation</a> of application programs (we call them "
-"&ldquo;jails&rdquo;)."
+"proprietary/proprietary-jails.html\">separate list of proprietary systems "
+"that censor installation</a> of application programs (we call them &ldquo;"
+"jails&rdquo;)."
 msgstr ""
 "Um tipo de funcionalidade maliciosa é a censura do que os usuários podem "
 "acessar. Aqui estão alguns exemplos de programas que fazem isso. Temos uma "
@@ -13247,6 +13254,19 @@
 msgstr "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
 
 #~ msgid ""
+#~ "One kind of malicious functionality is censorship of what users can "
+#~ "access.  Here are examples of programs which do this.  We have a <a href="
+#~ "\"/proprietary/proprietary-jails.html#about-page\">separate list of "
+#~ "proprietary systems that censor installation</a> of application programs "
+#~ "(we call them &ldquo;jails&rdquo;)."
+#~ msgstr ""
+#~ "Um tipo de funcionalidade maliciosa é a censura do que os usuários podem 
"
+#~ "acessar. Aqui estão alguns exemplos de programas que fazem isso. Temos "
+#~ "uma <a href=\"/proprietary/proprietary-jails.html#about-page\">lista "
+#~ "separada de sistemas privativos que censuram a instalação</a> de "
+#~ "programas de aplicativos (os chamamos de “prisões”)."
+
+#~ msgid ""
 #~ "As of June, 2021, the pages in this directory list around 500 instances "
 #~ "of malicious functionalities (with more than 600 references to back them "
 #~ "up), but there are surely thousands more we don't know about."

Index: ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/ru.po,v
retrieving revision 1.685
retrieving revision 1.686
diff -u -b -r1.685 -r1.686
--- ru.po       15 Jul 2021 06:32:50 -0000      1.685
+++ ru.po       15 Jul 2021 07:33:52 -0000      1.686
@@ -510,7 +510,7 @@
 #. type: Content of: <div><ul><li><p>
 msgid ""
 "A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn.";
-"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\">can allow "
+"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
 "crackers to remotely gain access to the operating system</a> and install "
 "programs, view and delete data, or even create new user accounts with full "
 "user rights."
@@ -535,8 +535,8 @@
 #. type: Content of: <div><ul><li><p>
 msgid ""
 "<a href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-";
-"dream-incubation\">Advertising companies are experimenting to manipulate "
-"people's minds</a> and impose a new way of advertising by altering their "
+"dream-incubation\"> Advertising companies are experimenting to manipulate "
+"people's minds</a>, and impose a new way of advertising by altering their "
 "dreams. This &ldquo;targeted dream incubation&rdquo; would trigger &ldquo;"
 "refreshing dreams&rdquo; of the product, according to the companies."
 msgstr ""
@@ -6064,12 +6064,25 @@
 msgstr "Цензура в несвободных программах"
 
 #. type: Content of: <div><div><p>
+# | One kind of malicious functionality is censorship of what users can
+# | access.  Here are examples of programs which do this.  We have a <a
+# | [-href=\"/proprietary/proprietary-jails.html#about-page\">separate-]
+# | {+href=\"/proprietary/proprietary-jails.html\">separate+} list of
+# | proprietary systems that censor installation</a> of application programs
+# | (we call them &ldquo;jails&rdquo;).
+#, fuzzy
+#| msgid ""
+#| "One kind of malicious functionality is censorship of what users can "
+#| "access.  Here are examples of programs which do this.  We have a <a href="
+#| "\"/proprietary/proprietary-jails.html#about-page\">separate list of "
+#| "proprietary systems that censor installation</a> of application programs "
+#| "(we call them &ldquo;jails&rdquo;)."
 msgid ""
 "One kind of malicious functionality is censorship of what users can access.  "
 "Here are examples of programs which do this.  We have a <a href=\"/"
-"proprietary/proprietary-jails.html#about-page\">separate list of proprietary "
-"systems that censor installation</a> of application programs (we call them "
-"&ldquo;jails&rdquo;)."
+"proprietary/proprietary-jails.html\">separate list of proprietary systems "
+"that censor installation</a> of application programs (we call them &ldquo;"
+"jails&rdquo;)."
 msgstr ""
 "Один из видов вредоносных функций&nbsp;&mdash; 
цензура доступа пользователей."
 "Вот примеры программ, которые это делают. 
У нас есть <a href=\"/proprietary/"
@@ -13422,6 +13435,19 @@
 msgstr "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
 
 #~ msgid ""
+#~ "One kind of malicious functionality is censorship of what users can "
+#~ "access.  Here are examples of programs which do this.  We have a <a href="
+#~ "\"/proprietary/proprietary-jails.html#about-page\">separate list of "
+#~ "proprietary systems that censor installation</a> of application programs "
+#~ "(we call them &ldquo;jails&rdquo;)."
+#~ msgstr ""
+#~ "Один из видов вредоносных 
функций&nbsp;&mdash; цензура доступа "
+#~ "пользователей.Вот примеры программ, 
которые это делают. У нас есть <a "
+#~ "href=\"/proprietary/proprietary-jails.html#about-page\"> 
отдельный список "
+#~ "несвободных систем, которые подвергают 
цензуре установку</a> прикладных "
+#~ "программ (мы называем это 
&ldquo;тюрьмами&rdquo;)."
+
+#~ msgid ""
 #~ "As of June, 2021, the pages in this directory list around 500 instances "
 #~ "of malicious functionalities (with more than 600 references to back them "
 #~ "up), but there are surely thousands more we don't know about."

Index: tr.po
===================================================================
RCS file: /web/www/www/proprietary/po/tr.po,v
retrieving revision 1.202
retrieving revision 1.203
diff -u -b -r1.202 -r1.203
--- tr.po       15 Jul 2021 06:32:50 -0000      1.202
+++ tr.po       15 Jul 2021 07:33:52 -0000      1.203
@@ -415,7 +415,7 @@
 #. type: Content of: <div><ul><li><p>
 msgid ""
 "A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn.";
-"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\">can allow "
+"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
 "crackers to remotely gain access to the operating system</a> and install "
 "programs, view and delete data, or even create new user accounts with full "
 "user rights."
@@ -444,8 +444,8 @@
 #. type: Content of: <div><ul><li><p>
 msgid ""
 "<a href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-";
-"dream-incubation\">Advertising companies are experimenting to manipulate "
-"people's minds</a> and impose a new way of advertising by altering their "
+"dream-incubation\"> Advertising companies are experimenting to manipulate "
+"people's minds</a>, and impose a new way of advertising by altering their "
 "dreams. This &ldquo;targeted dream incubation&rdquo; would trigger &ldquo;"
 "refreshing dreams&rdquo; of the product, according to the companies."
 msgstr ""
@@ -4902,9 +4902,9 @@
 msgid ""
 "One kind of malicious functionality is censorship of what users can access.  "
 "Here are examples of programs which do this.  We have a <a href=\"/"
-"proprietary/proprietary-jails.html#about-page\">separate list of proprietary "
-"systems that censor installation</a> of application programs (we call them "
-"&ldquo;jails&rdquo;)."
+"proprietary/proprietary-jails.html\">separate list of proprietary systems "
+"that censor installation</a> of application programs (we call them &ldquo;"
+"jails&rdquo;)."
 msgstr ""
 
 #. type: Content of: <div><div><p>

Index: zh-cn.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-cn.po,v
retrieving revision 1.203
retrieving revision 1.204
diff -u -b -r1.203 -r1.204
--- zh-cn.po    15 Jul 2021 06:32:50 -0000      1.203
+++ zh-cn.po    15 Jul 2021 07:33:52 -0000      1.204
@@ -415,7 +415,7 @@
 #. type: Content of: <div><ul><li><p>
 msgid ""
 "A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn.";
-"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\">can allow "
+"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
 "crackers to remotely gain access to the operating system</a> and install "
 "programs, view and delete data, or even create new user accounts with full "
 "user rights."
@@ -443,8 +443,8 @@
 #. type: Content of: <div><ul><li><p>
 msgid ""
 "<a href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-";
-"dream-incubation\">Advertising companies are experimenting to manipulate "
-"people's minds</a> and impose a new way of advertising by altering their "
+"dream-incubation\"> Advertising companies are experimenting to manipulate "
+"people's minds</a>, and impose a new way of advertising by altering their "
 "dreams. This &ldquo;targeted dream incubation&rdquo; would trigger &ldquo;"
 "refreshing dreams&rdquo; of the product, according to the companies."
 msgstr ""
@@ -4717,9 +4717,9 @@
 msgid ""
 "One kind of malicious functionality is censorship of what users can access.  "
 "Here are examples of programs which do this.  We have a <a href=\"/"
-"proprietary/proprietary-jails.html#about-page\">separate list of proprietary "
-"systems that censor installation</a> of application programs (we call them "
-"&ldquo;jails&rdquo;)."
+"proprietary/proprietary-jails.html\">separate list of proprietary systems "
+"that censor installation</a> of application programs (we call them &ldquo;"
+"jails&rdquo;)."
 msgstr ""
 
 #. type: Content of: <div><div><p>

Index: zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-tw.po,v
retrieving revision 1.327
retrieving revision 1.328
diff -u -b -r1.327 -r1.328
--- zh-tw.po    15 Jul 2021 06:32:50 -0000      1.327
+++ zh-tw.po    15 Jul 2021 07:33:52 -0000      1.328
@@ -440,7 +440,7 @@
 #. type: Content of: <div><ul><li><p>
 msgid ""
 "A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn.";
-"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\">can allow "
+"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
 "crackers to remotely gain access to the operating system</a> and install "
 "programs, view and delete data, or even create new user accounts with full "
 "user rights."
@@ -462,8 +462,8 @@
 #. type: Content of: <div><ul><li><p>
 msgid ""
 "<a href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-";
-"dream-incubation\">Advertising companies are experimenting to manipulate "
-"people's minds</a> and impose a new way of advertising by altering their "
+"dream-incubation\"> Advertising companies are experimenting to manipulate "
+"people's minds</a>, and impose a new way of advertising by altering their "
 "dreams. This &ldquo;targeted dream incubation&rdquo; would trigger &ldquo;"
 "refreshing dreams&rdquo; of the product, according to the companies."
 msgstr ""
@@ -4220,9 +4220,9 @@
 msgid ""
 "One kind of malicious functionality is censorship of what users can access.  "
 "Here are examples of programs which do this.  We have a <a href=\"/"
-"proprietary/proprietary-jails.html#about-page\">separate list of proprietary "
-"systems that censor installation</a> of application programs (we call them "
-"&ldquo;jails&rdquo;)."
+"proprietary/proprietary-jails.html\">separate list of proprietary systems "
+"that censor installation</a> of application programs (we call them &ldquo;"
+"jails&rdquo;)."
 msgstr ""
 
 #. type: Content of: <div><div><p>



reply via email to

[Prev in Thread] Current Thread [Next in Thread]