www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary malware-mobiles.es.html malware...


From: GNUN
Subject: www/proprietary malware-mobiles.es.html malware...
Date: Sun, 25 Jul 2021 05:31:24 -0400 (EDT)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     21/07/25 05:31:23

Modified files:
        proprietary    : malware-mobiles.es.html 
                         malware-webpages.es.html 
                         proprietary-interference.es.html 
                         proprietary-surveillance.es.html 
        proprietary/po : malware-mobiles.es-en.html 
                         malware-mobiles.es.po 
                         malware-webpages.es-en.html 
                         malware-webpages.es.po 
                         proprietary-interference.es-en.html 
                         proprietary-interference.es.po 
                         proprietary-surveillance.es-en.html 
                         proprietary-surveillance.es.po 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-mobiles.es.html?cvsroot=www&r1=1.103&r2=1.104
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-webpages.es.html?cvsroot=www&r1=1.11&r2=1.12
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-interference.es.html?cvsroot=www&r1=1.25&r2=1.26
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-surveillance.es.html?cvsroot=www&r1=1.68&r2=1.69
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.es-en.html?cvsroot=www&r1=1.96&r2=1.97
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.es.po?cvsroot=www&r1=1.250&r2=1.251
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-webpages.es-en.html?cvsroot=www&r1=1.9&r2=1.10
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-webpages.es.po?cvsroot=www&r1=1.24&r2=1.25
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-interference.es-en.html?cvsroot=www&r1=1.22&r2=1.23
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-interference.es.po?cvsroot=www&r1=1.64&r2=1.65
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.es-en.html?cvsroot=www&r1=1.67&r2=1.68
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.es.po?cvsroot=www&r1=1.219&r2=1.220

Patches:
Index: malware-mobiles.es.html
===================================================================
RCS file: /web/www/www/proprietary/malware-mobiles.es.html,v
retrieving revision 1.103
retrieving revision 1.104
diff -u -b -r1.103 -r1.104
--- malware-mobiles.es.html     23 Jun 2021 09:30:53 -0000      1.103
+++ malware-mobiles.es.html     25 Jul 2021 09:31:22 -0000      1.104
@@ -940,7 +940,7 @@
 <!--#echo encoding="none" var="DATE" -->
 <p>Muchos desarrolladores de aplicaciones para móviles faltos de escrúpulos
 siguen encontrando maneras de <a
-href="https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/";>eludir
+href="https://www.cnet.com/tech/mobile/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/";>eludir
 las preferencias del usuario</a>, las regulaciones y las características del
 sistema operativo que favorecen la privacidad, a fin de obtener la mayor
 cantidad de datos privados que les sea posible.</p>
@@ -1972,7 +1972,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2021/06/23 09:30:53 $
+$Date: 2021/07/25 09:31:22 $
 
 <!-- timestamp end -->
 </p>

Index: malware-webpages.es.html
===================================================================
RCS file: /web/www/www/proprietary/malware-webpages.es.html,v
retrieving revision 1.11
retrieving revision 1.12
diff -u -b -r1.11 -r1.12
--- malware-webpages.es.html    1 Jun 2021 09:43:54 -0000       1.11
+++ malware-webpages.es.html    25 Jul 2021 09:31:23 -0000      1.12
@@ -136,7 +136,7 @@
 no se habrían visto afectados si hubieran utilizado <a
 href="/software/librejs/index.html">LibreJS</a>. También existen algunas
 extensiones para navegadores que <a
-href="https://www.cnet.com/how-to/how-to-stop-sites-from-using-your-cpu-to-mine-coins/";>bloquean
+href="https://www.cnet.com/tech/computing/how-to-stop-sites-from-using-your-cpu-to-mine-coins/";>bloquean
 específicamente los mineros JavaScript</a>.</p>
   </li>
 
@@ -391,7 +391,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2021/06/01 09:43:54 $
+$Date: 2021/07/25 09:31:23 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary-interference.es.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-interference.es.html,v
retrieving revision 1.25
retrieving revision 1.26
diff -u -b -r1.25 -r1.26
--- proprietary-interference.es.html    28 Jun 2021 09:59:40 -0000      1.25
+++ proprietary-interference.es.html    25 Jul 2021 09:31:23 -0000      1.26
@@ -307,7 +307,7 @@
 no se habrían visto afectados si hubieran utilizado <a
 href="/software/librejs/index.html">LibreJS</a>. También existen algunas
 extensiones para navegadores que <a
-href="https://www.cnet.com/how-to/how-to-stop-sites-from-using-your-cpu-to-mine-coins/";>bloquean
+href="https://www.cnet.com/tech/computing/how-to-stop-sites-from-using-your-cpu-to-mine-coins/";>bloquean
 específicamente los mineros JavaScript</a>.</p>
   </li>
 
@@ -554,7 +554,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2021/06/28 09:59:40 $
+$Date: 2021/07/25 09:31:23 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary-surveillance.es.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-surveillance.es.html,v
retrieving revision 1.68
retrieving revision 1.69
diff -u -b -r1.68 -r1.69
--- proprietary-surveillance.es.html    8 Jul 2021 09:33:22 -0000       1.68
+++ proprietary-surveillance.es.html    25 Jul 2021 09:31:23 -0000      1.69
@@ -1590,7 +1590,7 @@
 <!--#echo encoding="none" var="DATE" -->
 <p>Muchos desarrolladores de aplicaciones para móviles faltos de escrúpulos
 siguen encontrando maneras de <a
-href="https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/";>eludir
+href="https://www.cnet.com/tech/mobile/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/";>eludir
 las preferencias del usuario</a>, las regulaciones y las características del
 sistema operativo que favorecen la privacidad, a fin de obtener la mayor
 cantidad de datos privados que les sea posible.</p>
@@ -4356,7 +4356,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2021/07/08 09:33:22 $
+$Date: 2021/07/25 09:31:23 $
 
 <!-- timestamp end -->
 </p>

Index: po/malware-mobiles.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.es-en.html,v
retrieving revision 1.96
retrieving revision 1.97
diff -u -b -r1.96 -r1.97
--- po/malware-mobiles.es-en.html       23 Jun 2021 09:30:54 -0000      1.96
+++ po/malware-mobiles.es-en.html       25 Jul 2021 09:31:23 -0000      1.97
@@ -766,7 +766,7 @@
     <!--#set var="DATE" value='<small class="date-tag">2019-07</small>'
     --><!--#echo encoding="none" var="DATE" -->
     <p>Many unscrupulous mobile-app developers keep finding ways to <a
-    
href="https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/";>
+    
href="https://www.cnet.com/tech/mobile/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/";>
     bypass user's settings</a>, regulations, and privacy-enhancing features
     of the operating system, in order to gather as much private data as
     they possibly can.</p>
@@ -1590,7 +1590,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2021/06/23 09:30:54 $
+$Date: 2021/07/25 09:31:23 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/malware-mobiles.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.es.po,v
retrieving revision 1.250
retrieving revision 1.251
diff -u -b -r1.250 -r1.251
--- po/malware-mobiles.es.po    25 Jul 2021 09:01:56 -0000      1.250
+++ po/malware-mobiles.es.po    25 Jul 2021 09:31:23 -0000      1.251
@@ -1215,12 +1215,6 @@
 "Con un programa libre no existiría ninguna lista de los que se lo han "
 "descargado."
 
-# | Many unscrupulous mobile-app developers keep finding ways to <a
-# | 
[-href=\"https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/\";>-]
-# | 
{+href=\"https://www.cnet.com/tech/mobile/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/\";>+}
-# | bypass user's settings</a>, regulations, and privacy-enhancing features of
-# | the operating system, in order to gather as much private data as they
-# | possibly can.
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
 "Many unscrupulous mobile-app developers keep finding ways to <a href="
@@ -1745,8 +1739,8 @@
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
 "<small>(Note that this article misuses the words &ldquo;<a href=\"/"
-"philosophy/free-sw.html\">free software</a>&rdquo; referring to zero "
-"price.)</small>"
+"philosophy/free-sw.html\">free software</a>&rdquo; referring to zero price.)"
+"</small>"
 msgstr ""
 "<small>(Advierta que este artículo emplea mal las palabras &ldquo;<a 
href=\"/"
 "philosophy/free-sw.html\">software libre</a>&rdquo; para referirse a "

Index: po/malware-webpages.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-webpages.es-en.html,v
retrieving revision 1.9
retrieving revision 1.10
diff -u -b -r1.9 -r1.10
--- po/malware-webpages.es-en.html      1 Jun 2021 09:44:00 -0000       1.9
+++ po/malware-webpages.es-en.html      25 Jul 2021 09:31:23 -0000      1.10
@@ -116,7 +116,7 @@
     visitors wouldn't have been affected if they had used <a
     href="/software/librejs/index.html">LibreJS</a>. Some
     browser extensions that <a
-    
href="https://www.cnet.com/how-to/how-to-stop-sites-from-using-your-cpu-to-mine-coins/";>
+    
href="https://www.cnet.com/tech/computing/how-to-stop-sites-from-using-your-cpu-to-mine-coins/";>
     specifically block JavaScript miners</a> are also available.</p>
   </li>
 
@@ -310,7 +310,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2021/06/01 09:44:00 $
+$Date: 2021/07/25 09:31:23 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/malware-webpages.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-webpages.es.po,v
retrieving revision 1.24
retrieving revision 1.25
diff -u -b -r1.24 -r1.25
--- po/malware-webpages.es.po   25 Jul 2021 09:01:56 -0000      1.24
+++ po/malware-webpages.es.po   25 Jul 2021 09:31:23 -0000      1.25
@@ -178,21 +178,14 @@
 msgid ""
 "<small>(Note that the article refers to the infected software as &ldquo;"
 "content management system&rdquo;. A better term would be &ldquo;<a href=\"/"
-"philosophy/words-to-avoid.html#Content\">website revision system</"
-"a>&rdquo;.)</small>"
+"philosophy/words-to-avoid.html#Content\">website revision system</a>&rdquo;.)"
+"</small>"
 msgstr ""
 "<small>(Observe que el artículo se refiere al software infectado como "
 "«sistema de gestión de contenidos». Un término más correcto sería 
&ldquo;<a "
 "href=\"/philosophy/words-to-avoid.html#Content\">sistema de revisión de "
 "sitios web</a>&rdquo;.)</small>"
 
-# | Since the miner was a nonfree JavaScript program, visitors wouldn't have
-# | been affected if they had used <a
-# | href=\"/software/librejs/index.html\">LibreJS</a>. Some browser extensions
-# | that <a
-# | 
[-href=\"https://www.cnet.com/how-to/how-to-stop-sites-from-using-your-cpu-to-mine-coins/\";>-]
-# | 
{+href=\"https://www.cnet.com/tech/computing/how-to-stop-sites-from-using-your-cpu-to-mine-coins/\";>+}
-# | specifically block JavaScript miners</a> are also available.
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
 "Since the miner was a nonfree JavaScript program, visitors wouldn't have "

Index: po/proprietary-interference.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-interference.es-en.html,v
retrieving revision 1.22
retrieving revision 1.23
diff -u -b -r1.22 -r1.23
--- po/proprietary-interference.es-en.html      28 Jun 2021 09:59:40 -0000      
1.22
+++ po/proprietary-interference.es-en.html      25 Jul 2021 09:31:23 -0000      
1.23
@@ -248,7 +248,7 @@
     visitors wouldn't have been affected if they had used <a
     href="/software/librejs/index.html">LibreJS</a>. Some
     browser extensions that <a
-    
href="https://www.cnet.com/how-to/how-to-stop-sites-from-using-your-cpu-to-mine-coins/";>
+    
href="https://www.cnet.com/tech/computing/how-to-stop-sites-from-using-your-cpu-to-mine-coins/";>
     specifically block JavaScript miners</a> are also available.</p>
   </li>
 
@@ -443,7 +443,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2021/06/28 09:59:40 $
+$Date: 2021/07/25 09:31:23 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/proprietary-interference.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-interference.es.po,v
retrieving revision 1.64
retrieving revision 1.65
diff -u -b -r1.64 -r1.65
--- po/proprietary-interference.es.po   25 Jul 2021 09:01:56 -0000      1.64
+++ po/proprietary-interference.es.po   25 Jul 2021 09:31:23 -0000      1.65
@@ -15,7 +15,6 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2021-07-25 05:55+0000\n"
 "X-Generator: Poedit 2.2.1\n"
 
 #. type: Content of: <title>
@@ -377,21 +376,14 @@
 msgid ""
 "<small>(Note that the article refers to the infected software as &ldquo;"
 "content management system&rdquo;. A better term would be &ldquo;<a href=\"/"
-"philosophy/words-to-avoid.html#Content\">website revision system</"
-"a>&rdquo;.)</small>"
+"philosophy/words-to-avoid.html#Content\">website revision system</a>&rdquo;.)"
+"</small>"
 msgstr ""
 "<small>(Observe que el artículo se refiere al software infectado como "
 "«sistema de gestión de contenidos». Un término más correcto sería 
&ldquo;<a "
 "href=\"/philosophy/words-to-avoid.html#Content\">sistema de revisión de "
 "sitios web</a>&rdquo;.)</small>"
 
-# | Since the miner was a nonfree JavaScript program, visitors wouldn't have
-# | been affected if they had used <a
-# | href=\"/software/librejs/index.html\">LibreJS</a>. Some browser extensions
-# | that <a
-# | 
[-href=\"https://www.cnet.com/how-to/how-to-stop-sites-from-using-your-cpu-to-mine-coins/\";>-]
-# | 
{+href=\"https://www.cnet.com/tech/computing/how-to-stop-sites-from-using-your-cpu-to-mine-coins/\";>+}
-# | specifically block JavaScript miners</a> are also available.
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
 "Since the miner was a nonfree JavaScript program, visitors wouldn't have "

Index: po/proprietary-surveillance.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.es-en.html,v
retrieving revision 1.67
retrieving revision 1.68
diff -u -b -r1.67 -r1.68
--- po/proprietary-surveillance.es-en.html      8 Jul 2021 09:33:22 -0000       
1.67
+++ po/proprietary-surveillance.es-en.html      25 Jul 2021 09:31:23 -0000      
1.68
@@ -1282,7 +1282,7 @@
     <!--#set var="DATE" value='<small class="date-tag">2019-07</small>'
     --><!--#echo encoding="none" var="DATE" -->
     <p>Many unscrupulous mobile-app developers keep finding ways to <a
-    
href="https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/";>
+    
href="https://www.cnet.com/tech/mobile/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/";>
     bypass user's settings</a>, regulations, and privacy-enhancing features
     of the operating system, in order to gather as much private data as
     they possibly can.</p>
@@ -3496,7 +3496,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2021/07/08 09:33:22 $
+$Date: 2021/07/25 09:31:23 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/proprietary-surveillance.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.es.po,v
retrieving revision 1.219
retrieving revision 1.220
diff -u -b -r1.219 -r1.220
--- po/proprietary-surveillance.es.po   25 Jul 2021 09:01:56 -0000      1.219
+++ po/proprietary-surveillance.es.po   25 Jul 2021 09:31:23 -0000      1.220
@@ -452,17 +452,17 @@
 "windows-diagnostic-data-in-your-organization#full-level\"> &ldquo;"
 "Full&rdquo; telemetry mode</a> allows Microsoft Windows engineers to access, "
 "among other things, registry keys <a href=\"https://docs.microsoft.com/en-us/";
-"previous-versions/windows/it-pro/windows-2000-server/"
-"cc939702(v=technet.10)\"> which can contain sensitive information like "
+"previous-versions/windows/it-pro/windows-2000-server/cc939702"
+"(v=technet.10)\"> which can contain sensitive information like "
 "administrator's login password</a>."
 msgstr ""
 "El <a href=\"https://docs.microsoft.com/en-us/windows/privacy/configure-";
 "windows-diagnostic-data-in-your-organization#full-level\">nivel de "
 "telemetría «Completo»</a> permite a los ingenieros de Microsoft acceder, "
 "entre otras cosas, a claves de registro <a href=\"https://docs.microsoft.com/";
-"en-us/previous-versions/windows/it-pro/windows-2000-server/"
-"cc939702(v=technet.10)\">que contienen información sensible, como la "
-"contraseña de inicio de sesión del administrador</a>."
+"en-us/previous-versions/windows/it-pro/windows-2000-server/cc939702"
+"(v=technet.10)\">que contienen información sensible, como la contraseña de "
+"inicio de sesión del administrador</a>."
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
@@ -2072,12 +2072,6 @@
 "Con un programa libre no habría ninguna lista de personas que lo han "
 "instalado."
 
-# | Many unscrupulous mobile-app developers keep finding ways to <a
-# | 
[-href=\"https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/\";>-]
-# | 
{+href=\"https://www.cnet.com/tech/mobile/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/\";>+}
-# | bypass user's settings</a>, regulations, and privacy-enhancing features of
-# | the operating system, in order to gather as much private data as they
-# | possibly can.
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
 "Many unscrupulous mobile-app developers keep finding ways to <a href="
@@ -2636,8 +2630,8 @@
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
 "<small>(Note that this article misuses the words &ldquo;<a href=\"/"
-"philosophy/free-sw.html\">free software</a>&rdquo; referring to zero "
-"price.)</small>"
+"philosophy/free-sw.html\">free software</a>&rdquo; referring to zero price.)"
+"</small>"
 msgstr ""
 "<small>(Advierta que este artículo emplea mal las palabras &ldquo;<a 
href=\"/"
 "philosophy/free-sw.html\">software libre</a>&rdquo; para referirse a "



reply via email to

[Prev in Thread] Current Thread [Next in Thread]