[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary malware-mobiles.es.html malware...
From: |
GNUN |
Subject: |
www/proprietary malware-mobiles.es.html malware... |
Date: |
Sun, 25 Jul 2021 05:31:24 -0400 (EDT) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 21/07/25 05:31:23
Modified files:
proprietary : malware-mobiles.es.html
malware-webpages.es.html
proprietary-interference.es.html
proprietary-surveillance.es.html
proprietary/po : malware-mobiles.es-en.html
malware-mobiles.es.po
malware-webpages.es-en.html
malware-webpages.es.po
proprietary-interference.es-en.html
proprietary-interference.es.po
proprietary-surveillance.es-en.html
proprietary-surveillance.es.po
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-mobiles.es.html?cvsroot=www&r1=1.103&r2=1.104
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-webpages.es.html?cvsroot=www&r1=1.11&r2=1.12
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-interference.es.html?cvsroot=www&r1=1.25&r2=1.26
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-surveillance.es.html?cvsroot=www&r1=1.68&r2=1.69
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.es-en.html?cvsroot=www&r1=1.96&r2=1.97
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.es.po?cvsroot=www&r1=1.250&r2=1.251
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-webpages.es-en.html?cvsroot=www&r1=1.9&r2=1.10
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-webpages.es.po?cvsroot=www&r1=1.24&r2=1.25
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-interference.es-en.html?cvsroot=www&r1=1.22&r2=1.23
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-interference.es.po?cvsroot=www&r1=1.64&r2=1.65
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.es-en.html?cvsroot=www&r1=1.67&r2=1.68
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.es.po?cvsroot=www&r1=1.219&r2=1.220
Patches:
Index: malware-mobiles.es.html
===================================================================
RCS file: /web/www/www/proprietary/malware-mobiles.es.html,v
retrieving revision 1.103
retrieving revision 1.104
diff -u -b -r1.103 -r1.104
--- malware-mobiles.es.html 23 Jun 2021 09:30:53 -0000 1.103
+++ malware-mobiles.es.html 25 Jul 2021 09:31:22 -0000 1.104
@@ -940,7 +940,7 @@
<!--#echo encoding="none" var="DATE" -->
<p>Muchos desarrolladores de aplicaciones para móviles faltos de escrúpulos
siguen encontrando maneras de <a
-href="https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/">eludir
+href="https://www.cnet.com/tech/mobile/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/">eludir
las preferencias del usuario</a>, las regulaciones y las caracterÃsticas del
sistema operativo que favorecen la privacidad, a fin de obtener la mayor
cantidad de datos privados que les sea posible.</p>
@@ -1972,7 +1972,7 @@
<p class="unprintable"><!-- timestamp start -->
Ãltima actualización:
-$Date: 2021/06/23 09:30:53 $
+$Date: 2021/07/25 09:31:22 $
<!-- timestamp end -->
</p>
Index: malware-webpages.es.html
===================================================================
RCS file: /web/www/www/proprietary/malware-webpages.es.html,v
retrieving revision 1.11
retrieving revision 1.12
diff -u -b -r1.11 -r1.12
--- malware-webpages.es.html 1 Jun 2021 09:43:54 -0000 1.11
+++ malware-webpages.es.html 25 Jul 2021 09:31:23 -0000 1.12
@@ -136,7 +136,7 @@
no se habrÃan visto afectados si hubieran utilizado <a
href="/software/librejs/index.html">LibreJS</a>. También existen algunas
extensiones para navegadores que <a
-href="https://www.cnet.com/how-to/how-to-stop-sites-from-using-your-cpu-to-mine-coins/">bloquean
+href="https://www.cnet.com/tech/computing/how-to-stop-sites-from-using-your-cpu-to-mine-coins/">bloquean
especÃficamente los mineros JavaScript</a>.</p>
</li>
@@ -391,7 +391,7 @@
<p class="unprintable"><!-- timestamp start -->
Ãltima actualización:
-$Date: 2021/06/01 09:43:54 $
+$Date: 2021/07/25 09:31:23 $
<!-- timestamp end -->
</p>
Index: proprietary-interference.es.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-interference.es.html,v
retrieving revision 1.25
retrieving revision 1.26
diff -u -b -r1.25 -r1.26
--- proprietary-interference.es.html 28 Jun 2021 09:59:40 -0000 1.25
+++ proprietary-interference.es.html 25 Jul 2021 09:31:23 -0000 1.26
@@ -307,7 +307,7 @@
no se habrÃan visto afectados si hubieran utilizado <a
href="/software/librejs/index.html">LibreJS</a>. También existen algunas
extensiones para navegadores que <a
-href="https://www.cnet.com/how-to/how-to-stop-sites-from-using-your-cpu-to-mine-coins/">bloquean
+href="https://www.cnet.com/tech/computing/how-to-stop-sites-from-using-your-cpu-to-mine-coins/">bloquean
especÃficamente los mineros JavaScript</a>.</p>
</li>
@@ -554,7 +554,7 @@
<p class="unprintable"><!-- timestamp start -->
Ãltima actualización:
-$Date: 2021/06/28 09:59:40 $
+$Date: 2021/07/25 09:31:23 $
<!-- timestamp end -->
</p>
Index: proprietary-surveillance.es.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-surveillance.es.html,v
retrieving revision 1.68
retrieving revision 1.69
diff -u -b -r1.68 -r1.69
--- proprietary-surveillance.es.html 8 Jul 2021 09:33:22 -0000 1.68
+++ proprietary-surveillance.es.html 25 Jul 2021 09:31:23 -0000 1.69
@@ -1590,7 +1590,7 @@
<!--#echo encoding="none" var="DATE" -->
<p>Muchos desarrolladores de aplicaciones para móviles faltos de escrúpulos
siguen encontrando maneras de <a
-href="https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/">eludir
+href="https://www.cnet.com/tech/mobile/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/">eludir
las preferencias del usuario</a>, las regulaciones y las caracterÃsticas del
sistema operativo que favorecen la privacidad, a fin de obtener la mayor
cantidad de datos privados que les sea posible.</p>
@@ -4356,7 +4356,7 @@
<p class="unprintable"><!-- timestamp start -->
Ãltima actualización:
-$Date: 2021/07/08 09:33:22 $
+$Date: 2021/07/25 09:31:23 $
<!-- timestamp end -->
</p>
Index: po/malware-mobiles.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.es-en.html,v
retrieving revision 1.96
retrieving revision 1.97
diff -u -b -r1.96 -r1.97
--- po/malware-mobiles.es-en.html 23 Jun 2021 09:30:54 -0000 1.96
+++ po/malware-mobiles.es-en.html 25 Jul 2021 09:31:23 -0000 1.97
@@ -766,7 +766,7 @@
<!--#set var="DATE" value='<small class="date-tag">2019-07</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Many unscrupulous mobile-app developers keep finding ways to <a
-
href="https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/">
+
href="https://www.cnet.com/tech/mobile/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/">
bypass user's settings</a>, regulations, and privacy-enhancing features
of the operating system, in order to gather as much private data as
they possibly can.</p>
@@ -1590,7 +1590,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/06/23 09:30:54 $
+$Date: 2021/07/25 09:31:23 $
<!-- timestamp end -->
</p>
</div>
Index: po/malware-mobiles.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.es.po,v
retrieving revision 1.250
retrieving revision 1.251
diff -u -b -r1.250 -r1.251
--- po/malware-mobiles.es.po 25 Jul 2021 09:01:56 -0000 1.250
+++ po/malware-mobiles.es.po 25 Jul 2021 09:31:23 -0000 1.251
@@ -1215,12 +1215,6 @@
"Con un programa libre no existirÃa ninguna lista de los que se lo han "
"descargado."
-# | Many unscrupulous mobile-app developers keep finding ways to <a
-# |
[-href=\"https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/\">-]
-# |
{+href=\"https://www.cnet.com/tech/mobile/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/\">+}
-# | bypass user's settings</a>, regulations, and privacy-enhancing features of
-# | the operating system, in order to gather as much private data as they
-# | possibly can.
#. type: Content of: <div><div><ul><li><p>
msgid ""
"Many unscrupulous mobile-app developers keep finding ways to <a href="
@@ -1745,8 +1739,8 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
"<small>(Note that this article misuses the words “<a href=\"/"
-"philosophy/free-sw.html\">free software</a>” referring to zero "
-"price.)</small>"
+"philosophy/free-sw.html\">free software</a>” referring to zero price.)"
+"</small>"
msgstr ""
"<small>(Advierta que este artÃculo emplea mal las palabras “<a
href=\"/"
"philosophy/free-sw.html\">software libre</a>” para referirse a "
Index: po/malware-webpages.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-webpages.es-en.html,v
retrieving revision 1.9
retrieving revision 1.10
diff -u -b -r1.9 -r1.10
--- po/malware-webpages.es-en.html 1 Jun 2021 09:44:00 -0000 1.9
+++ po/malware-webpages.es-en.html 25 Jul 2021 09:31:23 -0000 1.10
@@ -116,7 +116,7 @@
visitors wouldn't have been affected if they had used <a
href="/software/librejs/index.html">LibreJS</a>. Some
browser extensions that <a
-
href="https://www.cnet.com/how-to/how-to-stop-sites-from-using-your-cpu-to-mine-coins/">
+
href="https://www.cnet.com/tech/computing/how-to-stop-sites-from-using-your-cpu-to-mine-coins/">
specifically block JavaScript miners</a> are also available.</p>
</li>
@@ -310,7 +310,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/06/01 09:44:00 $
+$Date: 2021/07/25 09:31:23 $
<!-- timestamp end -->
</p>
</div>
Index: po/malware-webpages.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-webpages.es.po,v
retrieving revision 1.24
retrieving revision 1.25
diff -u -b -r1.24 -r1.25
--- po/malware-webpages.es.po 25 Jul 2021 09:01:56 -0000 1.24
+++ po/malware-webpages.es.po 25 Jul 2021 09:31:23 -0000 1.25
@@ -178,21 +178,14 @@
msgid ""
"<small>(Note that the article refers to the infected software as “"
"content management system”. A better term would be “<a href=\"/"
-"philosophy/words-to-avoid.html#Content\">website revision system</"
-"a>”.)</small>"
+"philosophy/words-to-avoid.html#Content\">website revision system</a>”.)"
+"</small>"
msgstr ""
"<small>(Observe que el artÃculo se refiere al software infectado como "
"«sistema de gestión de contenidos». Un término más correcto serÃa
“<a "
"href=\"/philosophy/words-to-avoid.html#Content\">sistema de revisión de "
"sitios web</a>”.)</small>"
-# | Since the miner was a nonfree JavaScript program, visitors wouldn't have
-# | been affected if they had used <a
-# | href=\"/software/librejs/index.html\">LibreJS</a>. Some browser extensions
-# | that <a
-# |
[-href=\"https://www.cnet.com/how-to/how-to-stop-sites-from-using-your-cpu-to-mine-coins/\">-]
-# |
{+href=\"https://www.cnet.com/tech/computing/how-to-stop-sites-from-using-your-cpu-to-mine-coins/\">+}
-# | specifically block JavaScript miners</a> are also available.
#. type: Content of: <div><div><ul><li><p>
msgid ""
"Since the miner was a nonfree JavaScript program, visitors wouldn't have "
Index: po/proprietary-interference.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-interference.es-en.html,v
retrieving revision 1.22
retrieving revision 1.23
diff -u -b -r1.22 -r1.23
--- po/proprietary-interference.es-en.html 28 Jun 2021 09:59:40 -0000
1.22
+++ po/proprietary-interference.es-en.html 25 Jul 2021 09:31:23 -0000
1.23
@@ -248,7 +248,7 @@
visitors wouldn't have been affected if they had used <a
href="/software/librejs/index.html">LibreJS</a>. Some
browser extensions that <a
-
href="https://www.cnet.com/how-to/how-to-stop-sites-from-using-your-cpu-to-mine-coins/">
+
href="https://www.cnet.com/tech/computing/how-to-stop-sites-from-using-your-cpu-to-mine-coins/">
specifically block JavaScript miners</a> are also available.</p>
</li>
@@ -443,7 +443,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/06/28 09:59:40 $
+$Date: 2021/07/25 09:31:23 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary-interference.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-interference.es.po,v
retrieving revision 1.64
retrieving revision 1.65
diff -u -b -r1.64 -r1.65
--- po/proprietary-interference.es.po 25 Jul 2021 09:01:56 -0000 1.64
+++ po/proprietary-interference.es.po 25 Jul 2021 09:31:23 -0000 1.65
@@ -15,7 +15,6 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2021-07-25 05:55+0000\n"
"X-Generator: Poedit 2.2.1\n"
#. type: Content of: <title>
@@ -377,21 +376,14 @@
msgid ""
"<small>(Note that the article refers to the infected software as “"
"content management system”. A better term would be “<a href=\"/"
-"philosophy/words-to-avoid.html#Content\">website revision system</"
-"a>”.)</small>"
+"philosophy/words-to-avoid.html#Content\">website revision system</a>”.)"
+"</small>"
msgstr ""
"<small>(Observe que el artÃculo se refiere al software infectado como "
"«sistema de gestión de contenidos». Un término más correcto serÃa
“<a "
"href=\"/philosophy/words-to-avoid.html#Content\">sistema de revisión de "
"sitios web</a>”.)</small>"
-# | Since the miner was a nonfree JavaScript program, visitors wouldn't have
-# | been affected if they had used <a
-# | href=\"/software/librejs/index.html\">LibreJS</a>. Some browser extensions
-# | that <a
-# |
[-href=\"https://www.cnet.com/how-to/how-to-stop-sites-from-using-your-cpu-to-mine-coins/\">-]
-# |
{+href=\"https://www.cnet.com/tech/computing/how-to-stop-sites-from-using-your-cpu-to-mine-coins/\">+}
-# | specifically block JavaScript miners</a> are also available.
#. type: Content of: <div><div><ul><li><p>
msgid ""
"Since the miner was a nonfree JavaScript program, visitors wouldn't have "
Index: po/proprietary-surveillance.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.es-en.html,v
retrieving revision 1.67
retrieving revision 1.68
diff -u -b -r1.67 -r1.68
--- po/proprietary-surveillance.es-en.html 8 Jul 2021 09:33:22 -0000
1.67
+++ po/proprietary-surveillance.es-en.html 25 Jul 2021 09:31:23 -0000
1.68
@@ -1282,7 +1282,7 @@
<!--#set var="DATE" value='<small class="date-tag">2019-07</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Many unscrupulous mobile-app developers keep finding ways to <a
-
href="https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/">
+
href="https://www.cnet.com/tech/mobile/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/">
bypass user's settings</a>, regulations, and privacy-enhancing features
of the operating system, in order to gather as much private data as
they possibly can.</p>
@@ -3496,7 +3496,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/07/08 09:33:22 $
+$Date: 2021/07/25 09:31:23 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary-surveillance.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.es.po,v
retrieving revision 1.219
retrieving revision 1.220
diff -u -b -r1.219 -r1.220
--- po/proprietary-surveillance.es.po 25 Jul 2021 09:01:56 -0000 1.219
+++ po/proprietary-surveillance.es.po 25 Jul 2021 09:31:23 -0000 1.220
@@ -452,17 +452,17 @@
"windows-diagnostic-data-in-your-organization#full-level\"> “"
"Full” telemetry mode</a> allows Microsoft Windows engineers to access, "
"among other things, registry keys <a href=\"https://docs.microsoft.com/en-us/"
-"previous-versions/windows/it-pro/windows-2000-server/"
-"cc939702(v=technet.10)\"> which can contain sensitive information like "
+"previous-versions/windows/it-pro/windows-2000-server/cc939702"
+"(v=technet.10)\"> which can contain sensitive information like "
"administrator's login password</a>."
msgstr ""
"El <a href=\"https://docs.microsoft.com/en-us/windows/privacy/configure-"
"windows-diagnostic-data-in-your-organization#full-level\">nivel de "
"telemetrÃa «Completo»</a> permite a los ingenieros de Microsoft acceder, "
"entre otras cosas, a claves de registro <a href=\"https://docs.microsoft.com/"
-"en-us/previous-versions/windows/it-pro/windows-2000-server/"
-"cc939702(v=technet.10)\">que contienen información sensible, como la "
-"contraseña de inicio de sesión del administrador</a>."
+"en-us/previous-versions/windows/it-pro/windows-2000-server/cc939702"
+"(v=technet.10)\">que contienen información sensible, como la contraseña de "
+"inicio de sesión del administrador</a>."
#. type: Content of: <div><div><ul><li><p>
msgid ""
@@ -2072,12 +2072,6 @@
"Con un programa libre no habrÃa ninguna lista de personas que lo han "
"instalado."
-# | Many unscrupulous mobile-app developers keep finding ways to <a
-# |
[-href=\"https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/\">-]
-# |
{+href=\"https://www.cnet.com/tech/mobile/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/\">+}
-# | bypass user's settings</a>, regulations, and privacy-enhancing features of
-# | the operating system, in order to gather as much private data as they
-# | possibly can.
#. type: Content of: <div><div><ul><li><p>
msgid ""
"Many unscrupulous mobile-app developers keep finding ways to <a href="
@@ -2636,8 +2630,8 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
"<small>(Note that this article misuses the words “<a href=\"/"
-"philosophy/free-sw.html\">free software</a>” referring to zero "
-"price.)</small>"
+"philosophy/free-sw.html\">free software</a>” referring to zero price.)"
+"</small>"
msgstr ""
"<small>(Advierta que este artÃculo emplea mal las palabras “<a
href=\"/"
"philosophy/free-sw.html\">software libre</a>” para referirse a "
[Prev in Thread] |
Current Thread |
[Next in Thread] |
- www/proprietary malware-mobiles.es.html malware...,
GNUN <=