www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary/po proprietary.zh-cn.po


From: Wensheng XIE
Subject: www/proprietary/po proprietary.zh-cn.po
Date: Fri, 16 Jul 2021 04:38:55 -0400 (EDT)

CVSROOT:        /web/www
Module name:    www
Changes by:     Wensheng XIE <wxie>     21/07/16 04:38:55

Modified files:
        proprietary/po : proprietary.zh-cn.po 

Log message:
        zh-cn: update translation

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-cn.po?cvsroot=www&r1=1.231&r2=1.232

Patches:
Index: proprietary.zh-cn.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-cn.po,v
retrieving revision 1.231
retrieving revision 1.232
diff -u -b -r1.231 -r1.232
--- proprietary.zh-cn.po        15 Jul 2021 07:33:51 -0000      1.231
+++ proprietary.zh-cn.po        16 Jul 2021 08:38:55 -0000      1.232
@@ -8,7 +8,7 @@
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
 "POT-Creation-Date: 2021-07-15 07:26+0000\n"
-"PO-Revision-Date: 2021-07-06 17:00+0800\n"
+"PO-Revision-Date: 2021-07-16 16:36+0800\n"
 "Last-Translator: Wensheng Xie <wxie@member.fsf.org>\n"
 "Language-Team: CTT <www-zh-cn-translators@gnu.org>\n"
 "Language: zh_CN\n"
@@ -92,17 +92,12 @@
 "的存在。"
 
 #. type: Content of: <div><p>
-#, fuzzy
-#| msgid ""
-#| "As of June, 2021, the pages in this directory list around 500 instances "
-#| "of malicious functionalities (with more than 600 references to back them "
-#| "up), but there are surely thousands more we don't know about."
 msgid ""
 "As of July, 2021, the pages in this directory list around 500 instances of "
 "malicious functionalities (with more than 610 references to back them up), "
 "but there are surely thousands more we don't know about."
 msgstr ""
-"截至 2021 年 6 月,此目录的页面中列出了大约 500 
个恶意功能实例(有 600 多份证"
+"截至 2021 年 7 月,此目录的页面中列出了大约 510 
个恶意功能实例(有 600 多份证"
 "据支持),但是肯定还有数千个我们不知道情况。"
 
 #. type: Content of: <div><p>
@@ -327,6 +322,9 @@
 "programs, view and delete data, or even create new user accounts with full "
 "user rights."
 msgstr ""
+"一个新发现的微软 Windows 漏洞 <a 
href=\"https://edition.cnn.com/2021/07/08/";
+"tech/microsoft-windows-10-printnightmare/\"> 
让骇客能够远程获得操作系统的权限"
+"</a> 并安装程序、查看和删除数据,甚至创建å…
·æœ‰å®Œæ•´æƒé™çš„新账户。"
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
@@ -334,6 +332,8 @@
 "could be exploited but Windows users should still wait for Microsoft to fix "
 "the flaw, if they fix it."
 msgstr ""
+"安全ç 
”究机构意外泄漏了如何利用该漏洞的操作步骤,但是 Windows 
用户还在等待微软"
+"对此的修复,或者是否修复。"
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
@@ -351,6 +351,10 @@
 "dreams. This &ldquo;targeted dream incubation&rdquo; would trigger &ldquo;"
 "refreshing dreams&rdquo; of the product, according to the companies."
 msgstr ""
+"<a href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-";
+"dream-incubation\">广告å…
¬å¸æ­£åœ¨è¯•éªŒæ€ç»´æ“æŽ§</a>,一种通过改变梦境来植入广告的"
+"新方式。这些公司声称,这种 &ldquo;针对性梦境孵化&rdquo; 
会激发产品的 &ldquo;"
+"梦境刷新&rdquo;。"
 
 #. type: Content of: <div><ul><li><p>
 msgid ""



reply via email to

[Prev in Thread] Current Thread [Next in Thread]