www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary malware-apple.es.html proprieta...


From: GNUN
Subject: www/proprietary malware-apple.es.html proprieta...
Date: Tue, 21 Sep 2021 08:03:57 -0400 (EDT)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     21/09/21 08:03:57

Modified files:
        proprietary    : malware-apple.es.html 
                         proprietary-insecurity.es.html 
                         proprietary-jails.es.html proprietary.es.html 
        proprietary/po : es.po malware-apple.es-en.html 
                         malware-apple.es.po 
                         proprietary-insecurity.es-en.html 
                         proprietary-insecurity.es.po 
                         proprietary-jails.es-en.html 
                         proprietary-jails.es.po proprietary.es-en.html 
                         proprietary.es.po 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-apple.es.html?cvsroot=www&r1=1.112&r2=1.113
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-insecurity.es.html?cvsroot=www&r1=1.51&r2=1.52
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-jails.es.html?cvsroot=www&r1=1.49&r2=1.50
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary.es.html?cvsroot=www&r1=1.177&r2=1.178
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.486&r2=1.487
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.es-en.html?cvsroot=www&r1=1.102&r2=1.103
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.es.po?cvsroot=www&r1=1.237&r2=1.238
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.es-en.html?cvsroot=www&r1=1.46&r2=1.47
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.es.po?cvsroot=www&r1=1.132&r2=1.133
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-jails.es-en.html?cvsroot=www&r1=1.42&r2=1.43
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-jails.es.po?cvsroot=www&r1=1.90&r2=1.91
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es-en.html?cvsroot=www&r1=1.168&r2=1.169
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.517&r2=1.518

Patches:
Index: malware-apple.es.html
===================================================================
RCS file: /web/www/www/proprietary/malware-apple.es.html,v
retrieving revision 1.112
retrieving revision 1.113
diff -u -b -r1.112 -r1.113
--- malware-apple.es.html       6 Sep 2021 08:36:44 -0000       1.112
+++ malware-apple.es.html       21 Sep 2021 12:03:55 -0000      1.113
@@ -463,6 +463,22 @@
 aplicación.</p>
 
 <ul class="blurbs">
+  <li id="M202109170">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2021-09</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>En Rusia, Apple ha <a
+href="https://gizmodo.com/apple-and-google-pull-opposition-app-from-russian-store-1847695238";>impedido
+que la aplicación de Navalny para el voto táctico se pueda instalar en los
+iPhone</a>.</p>
+
+    <p>No es posible hacerlo porque (1) los iPhone rechazan la instalación de
+aplicaciones que no procedan de Apple, y (2) Apple ha obedecido la ley de
+censura rusa. El primer punto es obra del software privativo de Apple.</p>
+  </li>
+
   <li id="M201904080">
     
     <!--#set var="DATE" value='<small class="date-tag">
@@ -1494,7 +1510,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2021/09/06 08:36:44 $
+$Date: 2021/09/21 12:03:55 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary-insecurity.es.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-insecurity.es.html,v
retrieving revision 1.51
retrieving revision 1.52
diff -u -b -r1.51 -r1.52
--- proprietary-insecurity.es.html      15 Sep 2021 09:32:56 -0000      1.51
+++ proprietary-insecurity.es.html      21 Sep 2021 12:03:55 -0000      1.52
@@ -95,9 +95,9 @@
 <!--#echo encoding="none" var="DATE" -->
 <p>Varios modelos de cámaras de seguridad, DVR y monitores de bebés que
 funcionan con software privativo <a
-href="https://www.wired.com/story/kalay-iot-bug-video-feeds/";>tienen una
-vulnerabilidad que puede permitir a posibles atacantes acceder a los
-registros en vivo</a>.</p>
+href="https://www.wired.com/story/kalay-iot-bug-video-feeds/";>están
+afectados por una vulnerabilidad que puede permitir a posibles atacantes
+acceder a los registros en vivo</a>.</p>
   </li>
 
   <li id="M202107180">
@@ -1521,7 +1521,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2021/09/15 09:32:56 $
+$Date: 2021/09/21 12:03:55 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary-jails.es.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-jails.es.html,v
retrieving revision 1.49
retrieving revision 1.50
diff -u -b -r1.49 -r1.50
--- proprietary-jails.es.html   6 Sep 2021 08:36:44 -0000       1.49
+++ proprietary-jails.es.html   21 Sep 2021 12:03:55 -0000      1.50
@@ -89,6 +89,22 @@
 <h3 id="apple">Apple</h3>
 
 <ul class="blurbs">
+  <li id="M202109170">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2021-09</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>En Rusia, Apple ha <a
+href="https://gizmodo.com/apple-and-google-pull-opposition-app-from-russian-store-1847695238";>impedido
+que la aplicación de Navalny para el voto táctico se pueda instalar en los
+iPhone</a>.</p>
+
+    <p>No es posible hacerlo porque (1) los iPhone rechazan la instalación de
+aplicaciones que no procedan de Apple, y (2) Apple ha obedecido la ley de
+censura rusa. El primer punto es obra del software privativo de Apple.</p>
+  </li>
+
   <li id="M201904080">
     
     <!--#set var="DATE" value='<small class="date-tag">
@@ -500,7 +516,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2021/09/06 08:36:44 $
+$Date: 2021/09/21 12:03:55 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary.es.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary.es.html,v
retrieving revision 1.177
retrieving revision 1.178
diff -u -b -r1.177 -r1.178
--- proprietary.es.html 15 Sep 2021 09:32:56 -0000      1.177
+++ proprietary.es.html 21 Sep 2021 12:03:55 -0000      1.178
@@ -197,6 +197,22 @@
 <h3 id="latest">Añadidos recientes</h3>
 
 <ul class="blurbs">
+  <li id="M202109170">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2021-09</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>En Rusia, Apple ha <a
+href="https://gizmodo.com/apple-and-google-pull-opposition-app-from-russian-store-1847695238";>impedido
+que la aplicación de Navalny para el voto táctico se pueda instalar en los
+iPhone</a>.</p>
+
+    <p>No es posible hacerlo porque (1) los iPhone rechazan la instalación de
+aplicaciones que no procedan de Apple, y (2) Apple ha obedecido la ley de
+censura rusa. El primer punto es obra del software privativo de Apple.</p>
+  </li>
+
   <li id="M202108170">
     
     <!--#set var="DATE" value='<small class="date-tag">
@@ -205,9 +221,9 @@
 <!--#echo encoding="none" var="DATE" -->
 <p>Varios modelos de cámaras de seguridad, DVR y monitores de bebés que
 funcionan con software privativo <a
-href="https://www.wired.com/story/kalay-iot-bug-video-feeds/";>tienen una
-vulnerabilidad que puede permitir a posibles atacantes acceder a los
-registros en vivo</a>.</p>
+href="https://www.wired.com/story/kalay-iot-bug-video-feeds/";>están
+afectados por una vulnerabilidad que puede permitir a posibles atacantes
+acceder a los registros en vivo</a>.</p>
   </li>
 
   <li id="M202108240">
@@ -263,27 +279,6 @@
 «<cite>crackers</cite>» como <a
 
href="/philosophy/words-to-avoid.es.html#Hacker">«<cite>hackers</cite>»</a>).</small></p>
   </li>
-
-  <li id="M202107090">
-    
-    <!--#set var="DATE" value='<small class="date-tag">
-2021-07</small>'
-    -->
-<!--#echo encoding="none" var="DATE" -->
-<p>Una nueva vulnerabilidad descubierta en Microsoft Windows <a
-href="https://edition.cnn.com/2021/07/08/tech/microsoft-windows-10-printnightmare/";>permite
-que delincuentes informáticos accedan de forma remota al sistema
-operativo</a> e instalen programas, vean y borren datos, o incluso creen
-nuevas cuentas de usuario con todos los permisos.</p>
-
-    <p>La empresa de seguridad que la descubrió ha filtrado accidentalmente
-instrucciones para aprovechar ese fallo, pero los usuarios de de Windows
-tendrán que esperar a que Microsoft lo arregle, si es que lo hace.</p>
-
-    <p><small>(Advierta que en ese artículo se refieren erróneamente a los
-«<cite>crackers</cite>» como <a
-href="/philosophy/words-to-avoid.es.html#Hacker">«<cite>hackers</cite>»</a>).</small></p>
-  </li>
 </ul>
 <p class="button right-align">
 <a href="/proprietary/all.html">Ver más&hellip;</a></p>
@@ -366,7 +361,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2021/09/15 09:32:56 $
+$Date: 2021/09/21 12:03:55 $
 
 <!-- timestamp end -->
 </p>

Index: po/es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.486
retrieving revision 1.487
diff -u -b -r1.486 -r1.487
--- po/es.po    20 Sep 2021 11:36:11 -0000      1.486
+++ po/es.po    21 Sep 2021 12:03:55 -0000      1.487
@@ -620,6 +620,9 @@
 "opposition-app-from-russian-store-1847695238\"> impossible to load Navalny's "
 "tactical voting app into an iPhone</a> in Russia."
 msgstr ""
+"En Rusia, Apple ha <a href=\"https://gizmodo.com/apple-and-google-pull-";
+"opposition-app-from-russian-store-1847695238\">impedido que la aplicación de 
"
+"Navalny para el voto táctico se pueda instalar en los iPhone</a>."
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
@@ -627,6 +630,9 @@
 "other than Apple, and (2) Apple has obeyed a Russian censorship law.  The "
 "first point is enforced by Apple's nonfree software."
 msgstr ""
+"No es posible hacerlo porque (1) los iPhone rechazan la instalación de "
+"aplicaciones que no procedan de Apple, y (2) Apple ha obedecido la ley de "
+"censura rusa. El primer punto es obra del software privativo de Apple."
 
 #. type: Content of: <div><ul><li><p>
 msgid ""

Index: po/malware-apple.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.es-en.html,v
retrieving revision 1.102
retrieving revision 1.103
diff -u -b -r1.102 -r1.103
--- po/malware-apple.es-en.html 6 Sep 2021 08:36:44 -0000       1.102
+++ po/malware-apple.es-en.html 21 Sep 2021 12:03:56 -0000      1.103
@@ -383,6 +383,20 @@
 <p>Jails are systems that impose censorship on application programs.</p>
 
 <ul class="blurbs">
+  <li id="M202109170">
+    <!--#set var="DATE" value='<small class="date-tag">2021-09</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Apple has made it <a
+    
href="https://gizmodo.com/apple-and-google-pull-opposition-app-from-russian-store-1847695238";>
+    impossible to load Navalny's tactical voting app into an iPhone</a>
+    in Russia.</p>
+
+    <p>It is impossible because (1) the iPhone refuses to load apps
+    from anywhere other than Apple, and (2) Apple has obeyed a Russian
+    censorship law.  The first point is enforced by Apple's nonfree
+    software.</p>
+  </li>
+
   <li id="M201904080">
     <!--#set var="DATE" value='<small class="date-tag">2019-04</small>'
     --><!--#echo encoding="none" var="DATE" -->
@@ -1209,7 +1223,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2021/09/06 08:36:44 $
+$Date: 2021/09/21 12:03:56 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/malware-apple.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.es.po,v
retrieving revision 1.237
retrieving revision 1.238
diff -u -b -r1.237 -r1.238

Index: po/proprietary-insecurity.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.es-en.html,v
retrieving revision 1.46
retrieving revision 1.47
diff -u -b -r1.46 -r1.47
--- po/proprietary-insecurity.es-en.html        15 Sep 2021 09:32:56 -0000      
1.46
+++ po/proprietary-insecurity.es-en.html        21 Sep 2021 12:03:56 -0000      
1.47
@@ -85,7 +85,7 @@
     <p>Various models of security cameras, DVRs,
     and baby monitors that run proprietary software <a
     href="https://www.wired.com/story/kalay-iot-bug-video-feeds/";>are
-    exploited by a security vulnerability that could give attackers access
+    affected by a security vulnerability that could give attackers access
     to live feeds</a>.</p>
   </li>
 
@@ -1197,7 +1197,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2021/09/15 09:32:56 $
+$Date: 2021/09/21 12:03:56 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/proprietary-insecurity.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.es.po,v
retrieving revision 1.132
retrieving revision 1.133
diff -u -b -r1.132 -r1.133
--- po/proprietary-insecurity.es.po     21 Sep 2021 11:53:35 -0000      1.132
+++ po/proprietary-insecurity.es.po     21 Sep 2021 12:03:56 -0000      1.133
@@ -139,11 +139,6 @@
 "webmasters@gnu.org&gt;</a>. Incluya la URL de una o más referencias "
 "confiables que justifiquen su inclusión."
 
-# | Various models of security cameras, DVRs, and baby monitors that run
-# | proprietary software <a
-# | href=\"https://www.wired.com/story/kalay-iot-bug-video-feeds/\";>are
-# | [-exploited-] {+affected+} by a security vulnerability that could give
-# | attackers access to live feeds</a>.
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
 "Various models of security cameras, DVRs, and baby monitors that run "

Index: po/proprietary-jails.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-jails.es-en.html,v
retrieving revision 1.42
retrieving revision 1.43
diff -u -b -r1.42 -r1.43
--- po/proprietary-jails.es-en.html     6 Sep 2021 08:36:45 -0000       1.42
+++ po/proprietary-jails.es-en.html     21 Sep 2021 12:03:57 -0000      1.43
@@ -82,6 +82,20 @@
 <h3 id="apple">Apple</h3>
 
 <ul class="blurbs">
+  <li id="M202109170">
+    <!--#set var="DATE" value='<small class="date-tag">2021-09</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Apple has made it <a
+    
href="https://gizmodo.com/apple-and-google-pull-opposition-app-from-russian-store-1847695238";>
+    impossible to load Navalny's tactical voting app into an iPhone</a>
+    in Russia.</p>
+
+    <p>It is impossible because (1) the iPhone refuses to load apps
+    from anywhere other than Apple, and (2) Apple has obeyed a Russian
+    censorship law.  The first point is enforced by Apple's nonfree
+    software.</p>
+  </li>
+
   <li id="M201904080">
     <!--#set var="DATE" value='<small class="date-tag">2019-04</small>'
     --><!--#echo encoding="none" var="DATE" -->
@@ -416,7 +430,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2021/09/06 08:36:45 $
+$Date: 2021/09/21 12:03:57 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/proprietary-jails.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-jails.es.po,v
retrieving revision 1.90
retrieving revision 1.91
diff -u -b -r1.90 -r1.91

Index: po/proprietary.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es-en.html,v
retrieving revision 1.168
retrieving revision 1.169
diff -u -b -r1.168 -r1.169
--- po/proprietary.es-en.html   15 Sep 2021 09:32:56 -0000      1.168
+++ po/proprietary.es-en.html   21 Sep 2021 12:03:57 -0000      1.169
@@ -186,13 +186,27 @@
 <h3 id="latest">Latest additions</h3>
 
 <ul class="blurbs">
+  <li id="M202109170">
+    <!--#set var="DATE" value='<small class="date-tag">2021-09</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Apple has made it <a
+    
href="https://gizmodo.com/apple-and-google-pull-opposition-app-from-russian-store-1847695238";>
+    impossible to load Navalny's tactical voting app into an iPhone</a>
+    in Russia.</p>
+
+    <p>It is impossible because (1) the iPhone refuses to load apps
+    from anywhere other than Apple, and (2) Apple has obeyed a Russian
+    censorship law.  The first point is enforced by Apple's nonfree
+    software.</p>
+  </li>
+
   <li id="M202108170">
     <!--#set var="DATE" value='<small class="date-tag">2021-08</small>'
     --><!--#echo encoding="none" var="DATE" -->
     <p>Various models of security cameras, DVRs,
     and baby monitors that run proprietary software <a
     href="https://www.wired.com/story/kalay-iot-bug-video-feeds/";>are
-    exploited by a security vulnerability that could give attackers access
+    affected by a security vulnerability that could give attackers access
     to live feeds</a>.</p>
   </li>
 
@@ -237,24 +251,6 @@
     wrongly refers to crackers as &ldquo;<a
     
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>&rdquo;.</small></p>
   </li>
-
-  <li id="M202107090">
-    <!--#set var="DATE" value='<small class="date-tag">2021-07</small>'
-    --><!--#echo encoding="none" var="DATE" -->
-    <p>A newly found Microsoft Windows vulnerability <a
-    
href="https://edition.cnn.com/2021/07/08/tech/microsoft-windows-10-printnightmare/";>
-    can allow crackers to remotely gain access to the operating system</a>
-    and install programs, view and delete data, or even create new user
-    accounts with full user rights.</p>
-
-    <p>The security research firm accidentally leaked instructions on
-    how the flaw could be exploited but Windows users should still wait
-    for Microsoft to fix the flaw, if they fix it.</p>
-
-    <p><small>Please note that the article
-    wrongly refers to crackers as &ldquo;<a
-    
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>&rdquo;.</small></p>
-  </li>
 </ul>
 <p class="button right-align">
 <a href="/proprietary/all.html">More items&hellip;</a></p>
@@ -317,7 +313,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2021/09/15 09:32:56 $
+$Date: 2021/09/21 12:03:57 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.517
retrieving revision 1.518
diff -u -b -r1.517 -r1.518
--- po/proprietary.es.po        21 Sep 2021 11:53:35 -0000      1.517
+++ po/proprietary.es.po        21 Sep 2021 12:03:57 -0000      1.518
@@ -359,11 +359,6 @@
 "aplicaciones que no procedan de Apple, y (2) Apple ha obedecido la ley de "
 "censura rusa. El primer punto es obra del software privativo de Apple."
 
-# | Various models of security cameras, DVRs, and baby monitors that run
-# | proprietary software <a
-# | href=\"https://www.wired.com/story/kalay-iot-bug-video-feeds/\";>are
-# | [-exploited-] {+affected+} by a security vulnerability that could give
-# | attackers access to live feeds</a>.
 #. type: Content of: <div><ul><li><p>
 msgid ""
 "Various models of security cameras, DVRs, and baby monitors that run "



reply via email to

[Prev in Thread] Current Thread [Next in Thread]