[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary malware-apple.es.html proprieta...
From: |
GNUN |
Subject: |
www/proprietary malware-apple.es.html proprieta... |
Date: |
Tue, 21 Sep 2021 08:03:57 -0400 (EDT) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 21/09/21 08:03:57
Modified files:
proprietary : malware-apple.es.html
proprietary-insecurity.es.html
proprietary-jails.es.html proprietary.es.html
proprietary/po : es.po malware-apple.es-en.html
malware-apple.es.po
proprietary-insecurity.es-en.html
proprietary-insecurity.es.po
proprietary-jails.es-en.html
proprietary-jails.es.po proprietary.es-en.html
proprietary.es.po
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-apple.es.html?cvsroot=www&r1=1.112&r2=1.113
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-insecurity.es.html?cvsroot=www&r1=1.51&r2=1.52
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-jails.es.html?cvsroot=www&r1=1.49&r2=1.50
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary.es.html?cvsroot=www&r1=1.177&r2=1.178
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.486&r2=1.487
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.es-en.html?cvsroot=www&r1=1.102&r2=1.103
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.es.po?cvsroot=www&r1=1.237&r2=1.238
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.es-en.html?cvsroot=www&r1=1.46&r2=1.47
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.es.po?cvsroot=www&r1=1.132&r2=1.133
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-jails.es-en.html?cvsroot=www&r1=1.42&r2=1.43
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-jails.es.po?cvsroot=www&r1=1.90&r2=1.91
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es-en.html?cvsroot=www&r1=1.168&r2=1.169
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.517&r2=1.518
Patches:
Index: malware-apple.es.html
===================================================================
RCS file: /web/www/www/proprietary/malware-apple.es.html,v
retrieving revision 1.112
retrieving revision 1.113
diff -u -b -r1.112 -r1.113
--- malware-apple.es.html 6 Sep 2021 08:36:44 -0000 1.112
+++ malware-apple.es.html 21 Sep 2021 12:03:55 -0000 1.113
@@ -463,6 +463,22 @@
aplicación.</p>
<ul class="blurbs">
+ <li id="M202109170">
+
+ <!--#set var="DATE" value='<small class="date-tag">
+2021-09</small>'
+ -->
+<!--#echo encoding="none" var="DATE" -->
+<p>En Rusia, Apple ha <a
+href="https://gizmodo.com/apple-and-google-pull-opposition-app-from-russian-store-1847695238">impedido
+que la aplicación de Navalny para el voto táctico se pueda instalar en los
+iPhone</a>.</p>
+
+ <p>No es posible hacerlo porque (1) los iPhone rechazan la instalación de
+aplicaciones que no procedan de Apple, y (2) Apple ha obedecido la ley de
+censura rusa. El primer punto es obra del software privativo de Apple.</p>
+ </li>
+
<li id="M201904080">
<!--#set var="DATE" value='<small class="date-tag">
@@ -1494,7 +1510,7 @@
<p class="unprintable"><!-- timestamp start -->
Ãltima actualización:
-$Date: 2021/09/06 08:36:44 $
+$Date: 2021/09/21 12:03:55 $
<!-- timestamp end -->
</p>
Index: proprietary-insecurity.es.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-insecurity.es.html,v
retrieving revision 1.51
retrieving revision 1.52
diff -u -b -r1.51 -r1.52
--- proprietary-insecurity.es.html 15 Sep 2021 09:32:56 -0000 1.51
+++ proprietary-insecurity.es.html 21 Sep 2021 12:03:55 -0000 1.52
@@ -95,9 +95,9 @@
<!--#echo encoding="none" var="DATE" -->
<p>Varios modelos de cámaras de seguridad, DVR y monitores de bebés que
funcionan con software privativo <a
-href="https://www.wired.com/story/kalay-iot-bug-video-feeds/">tienen una
-vulnerabilidad que puede permitir a posibles atacantes acceder a los
-registros en vivo</a>.</p>
+href="https://www.wired.com/story/kalay-iot-bug-video-feeds/">están
+afectados por una vulnerabilidad que puede permitir a posibles atacantes
+acceder a los registros en vivo</a>.</p>
</li>
<li id="M202107180">
@@ -1521,7 +1521,7 @@
<p class="unprintable"><!-- timestamp start -->
Ãltima actualización:
-$Date: 2021/09/15 09:32:56 $
+$Date: 2021/09/21 12:03:55 $
<!-- timestamp end -->
</p>
Index: proprietary-jails.es.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-jails.es.html,v
retrieving revision 1.49
retrieving revision 1.50
diff -u -b -r1.49 -r1.50
--- proprietary-jails.es.html 6 Sep 2021 08:36:44 -0000 1.49
+++ proprietary-jails.es.html 21 Sep 2021 12:03:55 -0000 1.50
@@ -89,6 +89,22 @@
<h3 id="apple">Apple</h3>
<ul class="blurbs">
+ <li id="M202109170">
+
+ <!--#set var="DATE" value='<small class="date-tag">
+2021-09</small>'
+ -->
+<!--#echo encoding="none" var="DATE" -->
+<p>En Rusia, Apple ha <a
+href="https://gizmodo.com/apple-and-google-pull-opposition-app-from-russian-store-1847695238">impedido
+que la aplicación de Navalny para el voto táctico se pueda instalar en los
+iPhone</a>.</p>
+
+ <p>No es posible hacerlo porque (1) los iPhone rechazan la instalación de
+aplicaciones que no procedan de Apple, y (2) Apple ha obedecido la ley de
+censura rusa. El primer punto es obra del software privativo de Apple.</p>
+ </li>
+
<li id="M201904080">
<!--#set var="DATE" value='<small class="date-tag">
@@ -500,7 +516,7 @@
<p class="unprintable"><!-- timestamp start -->
Ãltima actualización:
-$Date: 2021/09/06 08:36:44 $
+$Date: 2021/09/21 12:03:55 $
<!-- timestamp end -->
</p>
Index: proprietary.es.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary.es.html,v
retrieving revision 1.177
retrieving revision 1.178
diff -u -b -r1.177 -r1.178
--- proprietary.es.html 15 Sep 2021 09:32:56 -0000 1.177
+++ proprietary.es.html 21 Sep 2021 12:03:55 -0000 1.178
@@ -197,6 +197,22 @@
<h3 id="latest">Añadidos recientes</h3>
<ul class="blurbs">
+ <li id="M202109170">
+
+ <!--#set var="DATE" value='<small class="date-tag">
+2021-09</small>'
+ -->
+<!--#echo encoding="none" var="DATE" -->
+<p>En Rusia, Apple ha <a
+href="https://gizmodo.com/apple-and-google-pull-opposition-app-from-russian-store-1847695238">impedido
+que la aplicación de Navalny para el voto táctico se pueda instalar en los
+iPhone</a>.</p>
+
+ <p>No es posible hacerlo porque (1) los iPhone rechazan la instalación de
+aplicaciones que no procedan de Apple, y (2) Apple ha obedecido la ley de
+censura rusa. El primer punto es obra del software privativo de Apple.</p>
+ </li>
+
<li id="M202108170">
<!--#set var="DATE" value='<small class="date-tag">
@@ -205,9 +221,9 @@
<!--#echo encoding="none" var="DATE" -->
<p>Varios modelos de cámaras de seguridad, DVR y monitores de bebés que
funcionan con software privativo <a
-href="https://www.wired.com/story/kalay-iot-bug-video-feeds/">tienen una
-vulnerabilidad que puede permitir a posibles atacantes acceder a los
-registros en vivo</a>.</p>
+href="https://www.wired.com/story/kalay-iot-bug-video-feeds/">están
+afectados por una vulnerabilidad que puede permitir a posibles atacantes
+acceder a los registros en vivo</a>.</p>
</li>
<li id="M202108240">
@@ -263,27 +279,6 @@
«<cite>crackers</cite>» como <a
href="/philosophy/words-to-avoid.es.html#Hacker">«<cite>hackers</cite>»</a>).</small></p>
</li>
-
- <li id="M202107090">
-
- <!--#set var="DATE" value='<small class="date-tag">
-2021-07</small>'
- -->
-<!--#echo encoding="none" var="DATE" -->
-<p>Una nueva vulnerabilidad descubierta en Microsoft Windows <a
-href="https://edition.cnn.com/2021/07/08/tech/microsoft-windows-10-printnightmare/">permite
-que delincuentes informáticos accedan de forma remota al sistema
-operativo</a> e instalen programas, vean y borren datos, o incluso creen
-nuevas cuentas de usuario con todos los permisos.</p>
-
- <p>La empresa de seguridad que la descubrió ha filtrado accidentalmente
-instrucciones para aprovechar ese fallo, pero los usuarios de de Windows
-tendrán que esperar a que Microsoft lo arregle, si es que lo hace.</p>
-
- <p><small>(Advierta que en ese artÃculo se refieren erróneamente a los
-«<cite>crackers</cite>» como <a
-href="/philosophy/words-to-avoid.es.html#Hacker">«<cite>hackers</cite>»</a>).</small></p>
- </li>
</ul>
<p class="button right-align">
<a href="/proprietary/all.html">Ver más…</a></p>
@@ -366,7 +361,7 @@
<p class="unprintable"><!-- timestamp start -->
Ãltima actualización:
-$Date: 2021/09/15 09:32:56 $
+$Date: 2021/09/21 12:03:55 $
<!-- timestamp end -->
</p>
Index: po/es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.486
retrieving revision 1.487
diff -u -b -r1.486 -r1.487
--- po/es.po 20 Sep 2021 11:36:11 -0000 1.486
+++ po/es.po 21 Sep 2021 12:03:55 -0000 1.487
@@ -620,6 +620,9 @@
"opposition-app-from-russian-store-1847695238\"> impossible to load Navalny's "
"tactical voting app into an iPhone</a> in Russia."
msgstr ""
+"En Rusia, Apple ha <a href=\"https://gizmodo.com/apple-and-google-pull-"
+"opposition-app-from-russian-store-1847695238\">impedido que la aplicación de
"
+"Navalny para el voto táctico se pueda instalar en los iPhone</a>."
#. type: Content of: <div><ul><li><p>
msgid ""
@@ -627,6 +630,9 @@
"other than Apple, and (2) Apple has obeyed a Russian censorship law. The "
"first point is enforced by Apple's nonfree software."
msgstr ""
+"No es posible hacerlo porque (1) los iPhone rechazan la instalación de "
+"aplicaciones que no procedan de Apple, y (2) Apple ha obedecido la ley de "
+"censura rusa. El primer punto es obra del software privativo de Apple."
#. type: Content of: <div><ul><li><p>
msgid ""
Index: po/malware-apple.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.es-en.html,v
retrieving revision 1.102
retrieving revision 1.103
diff -u -b -r1.102 -r1.103
--- po/malware-apple.es-en.html 6 Sep 2021 08:36:44 -0000 1.102
+++ po/malware-apple.es-en.html 21 Sep 2021 12:03:56 -0000 1.103
@@ -383,6 +383,20 @@
<p>Jails are systems that impose censorship on application programs.</p>
<ul class="blurbs">
+ <li id="M202109170">
+ <!--#set var="DATE" value='<small class="date-tag">2021-09</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>Apple has made it <a
+
href="https://gizmodo.com/apple-and-google-pull-opposition-app-from-russian-store-1847695238">
+ impossible to load Navalny's tactical voting app into an iPhone</a>
+ in Russia.</p>
+
+ <p>It is impossible because (1) the iPhone refuses to load apps
+ from anywhere other than Apple, and (2) Apple has obeyed a Russian
+ censorship law. The first point is enforced by Apple's nonfree
+ software.</p>
+ </li>
+
<li id="M201904080">
<!--#set var="DATE" value='<small class="date-tag">2019-04</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -1209,7 +1223,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/09/06 08:36:44 $
+$Date: 2021/09/21 12:03:56 $
<!-- timestamp end -->
</p>
</div>
Index: po/malware-apple.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.es.po,v
retrieving revision 1.237
retrieving revision 1.238
diff -u -b -r1.237 -r1.238
Index: po/proprietary-insecurity.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.es-en.html,v
retrieving revision 1.46
retrieving revision 1.47
diff -u -b -r1.46 -r1.47
--- po/proprietary-insecurity.es-en.html 15 Sep 2021 09:32:56 -0000
1.46
+++ po/proprietary-insecurity.es-en.html 21 Sep 2021 12:03:56 -0000
1.47
@@ -85,7 +85,7 @@
<p>Various models of security cameras, DVRs,
and baby monitors that run proprietary software <a
href="https://www.wired.com/story/kalay-iot-bug-video-feeds/">are
- exploited by a security vulnerability that could give attackers access
+ affected by a security vulnerability that could give attackers access
to live feeds</a>.</p>
</li>
@@ -1197,7 +1197,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/09/15 09:32:56 $
+$Date: 2021/09/21 12:03:56 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary-insecurity.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.es.po,v
retrieving revision 1.132
retrieving revision 1.133
diff -u -b -r1.132 -r1.133
--- po/proprietary-insecurity.es.po 21 Sep 2021 11:53:35 -0000 1.132
+++ po/proprietary-insecurity.es.po 21 Sep 2021 12:03:56 -0000 1.133
@@ -139,11 +139,6 @@
"webmasters@gnu.org></a>. Incluya la URL de una o más referencias "
"confiables que justifiquen su inclusión."
-# | Various models of security cameras, DVRs, and baby monitors that run
-# | proprietary software <a
-# | href=\"https://www.wired.com/story/kalay-iot-bug-video-feeds/\">are
-# | [-exploited-] {+affected+} by a security vulnerability that could give
-# | attackers access to live feeds</a>.
#. type: Content of: <div><div><ul><li><p>
msgid ""
"Various models of security cameras, DVRs, and baby monitors that run "
Index: po/proprietary-jails.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-jails.es-en.html,v
retrieving revision 1.42
retrieving revision 1.43
diff -u -b -r1.42 -r1.43
--- po/proprietary-jails.es-en.html 6 Sep 2021 08:36:45 -0000 1.42
+++ po/proprietary-jails.es-en.html 21 Sep 2021 12:03:57 -0000 1.43
@@ -82,6 +82,20 @@
<h3 id="apple">Apple</h3>
<ul class="blurbs">
+ <li id="M202109170">
+ <!--#set var="DATE" value='<small class="date-tag">2021-09</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>Apple has made it <a
+
href="https://gizmodo.com/apple-and-google-pull-opposition-app-from-russian-store-1847695238">
+ impossible to load Navalny's tactical voting app into an iPhone</a>
+ in Russia.</p>
+
+ <p>It is impossible because (1) the iPhone refuses to load apps
+ from anywhere other than Apple, and (2) Apple has obeyed a Russian
+ censorship law. The first point is enforced by Apple's nonfree
+ software.</p>
+ </li>
+
<li id="M201904080">
<!--#set var="DATE" value='<small class="date-tag">2019-04</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -416,7 +430,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/09/06 08:36:45 $
+$Date: 2021/09/21 12:03:57 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary-jails.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-jails.es.po,v
retrieving revision 1.90
retrieving revision 1.91
diff -u -b -r1.90 -r1.91
Index: po/proprietary.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es-en.html,v
retrieving revision 1.168
retrieving revision 1.169
diff -u -b -r1.168 -r1.169
--- po/proprietary.es-en.html 15 Sep 2021 09:32:56 -0000 1.168
+++ po/proprietary.es-en.html 21 Sep 2021 12:03:57 -0000 1.169
@@ -186,13 +186,27 @@
<h3 id="latest">Latest additions</h3>
<ul class="blurbs">
+ <li id="M202109170">
+ <!--#set var="DATE" value='<small class="date-tag">2021-09</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>Apple has made it <a
+
href="https://gizmodo.com/apple-and-google-pull-opposition-app-from-russian-store-1847695238">
+ impossible to load Navalny's tactical voting app into an iPhone</a>
+ in Russia.</p>
+
+ <p>It is impossible because (1) the iPhone refuses to load apps
+ from anywhere other than Apple, and (2) Apple has obeyed a Russian
+ censorship law. The first point is enforced by Apple's nonfree
+ software.</p>
+ </li>
+
<li id="M202108170">
<!--#set var="DATE" value='<small class="date-tag">2021-08</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Various models of security cameras, DVRs,
and baby monitors that run proprietary software <a
href="https://www.wired.com/story/kalay-iot-bug-video-feeds/">are
- exploited by a security vulnerability that could give attackers access
+ affected by a security vulnerability that could give attackers access
to live feeds</a>.</p>
</li>
@@ -237,24 +251,6 @@
wrongly refers to crackers as “<a
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>”.</small></p>
</li>
-
- <li id="M202107090">
- <!--#set var="DATE" value='<small class="date-tag">2021-07</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>A newly found Microsoft Windows vulnerability <a
-
href="https://edition.cnn.com/2021/07/08/tech/microsoft-windows-10-printnightmare/">
- can allow crackers to remotely gain access to the operating system</a>
- and install programs, view and delete data, or even create new user
- accounts with full user rights.</p>
-
- <p>The security research firm accidentally leaked instructions on
- how the flaw could be exploited but Windows users should still wait
- for Microsoft to fix the flaw, if they fix it.</p>
-
- <p><small>Please note that the article
- wrongly refers to crackers as “<a
-
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>”.</small></p>
- </li>
</ul>
<p class="button right-align">
<a href="/proprietary/all.html">More items…</a></p>
@@ -317,7 +313,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/09/15 09:32:56 $
+$Date: 2021/09/21 12:03:57 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.517
retrieving revision 1.518
diff -u -b -r1.517 -r1.518
--- po/proprietary.es.po 21 Sep 2021 11:53:35 -0000 1.517
+++ po/proprietary.es.po 21 Sep 2021 12:03:57 -0000 1.518
@@ -359,11 +359,6 @@
"aplicaciones que no procedan de Apple, y (2) Apple ha obedecido la ley de "
"censura rusa. El primer punto es obra del software privativo de Apple."
-# | Various models of security cameras, DVRs, and baby monitors that run
-# | proprietary software <a
-# | href=\"https://www.wired.com/story/kalay-iot-bug-video-feeds/\">are
-# | [-exploited-] {+affected+} by a security vulnerability that could give
-# | attackers access to live feeds</a>.
#. type: Content of: <div><ul><li><p>
msgid ""
"Various models of security cameras, DVRs, and baby monitors that run "
[Prev in Thread] |
Current Thread |
[Next in Thread] |
- www/proprietary malware-apple.es.html proprieta...,
GNUN <=