www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www planetfeeds.ru.html po/planetfeeds.ru.po pr...


From: GNUN
Subject: www planetfeeds.ru.html po/planetfeeds.ru.po pr...
Date: Thu, 20 Aug 2020 13:29:16 -0400 (EDT)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     20/08/20 13:29:16

Modified files:
        .              : planetfeeds.ru.html 
        po             : planetfeeds.ru.po 
        proprietary    : malware-google.ru.html 
                         proprietary-insecurity.ru.html 
                         proprietary.ru.html 
        proprietary/po : malware-google.ru-en.html malware-google.ru.po 
                         proprietary-insecurity.ru-en.html 
                         proprietary-insecurity.ru.po 
                         proprietary.ru-en.html proprietary.ru.po 
        software       : recent-releases-include.ru.html 
        software/po    : recent-releases-include.ru.po 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/planetfeeds.ru.html?cvsroot=www&r1=1.1100&r2=1.1101
http://web.cvs.savannah.gnu.org/viewcvs/www/po/planetfeeds.ru.po?cvsroot=www&r1=1.1632&r2=1.1633
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-google.ru.html?cvsroot=www&r1=1.55&r2=1.56
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-insecurity.ru.html?cvsroot=www&r1=1.90&r2=1.91
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary.ru.html?cvsroot=www&r1=1.164&r2=1.165
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.ru-en.html?cvsroot=www&r1=1.53&r2=1.54
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.ru.po?cvsroot=www&r1=1.122&r2=1.123
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ru-en.html?cvsroot=www&r1=1.88&r2=1.89
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ru.po?cvsroot=www&r1=1.249&r2=1.250
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru-en.html?cvsroot=www&r1=1.160&r2=1.161
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.380&r2=1.381
http://web.cvs.savannah.gnu.org/viewcvs/www/software/recent-releases-include.ru.html?cvsroot=www&r1=1.1989&r2=1.1990
http://web.cvs.savannah.gnu.org/viewcvs/www/software/po/recent-releases-include.ru.po?cvsroot=www&r1=1.2821&r2=1.2822

Patches:
Index: planetfeeds.ru.html
===================================================================
RCS file: /web/www/www/planetfeeds.ru.html,v
retrieving revision 1.1100
retrieving revision 1.1101
diff -u -b -r1.1100 -r1.1101
--- planetfeeds.ru.html 20 Aug 2020 04:59:30 -0000      1.1100
+++ planetfeeds.ru.html 20 Aug 2020 17:29:12 -0000      1.1101
@@ -6,25 +6,23 @@
 value="<a 
href='http://www.fsf.org/blogs/community/thank-you-for-helping-us-welcome-over-200-new-members'>"
 -->
 <!--#echo
 encoding="none" var="link" -->
-Thank you for helping us welcome over 200 new members<!--#echo encoding="none"
+Спасибо за то, что помогли нам 
приветствовать 200 новых членов<!--#echo 
encoding="none"
 var="a_close" -->
 <!-- TRANSLATORS: 
 
http://www.fsf.org/blogs/community/thank-you-for-helping-us-welcome-over-200-new-members
 -->
-: In the year 2020, every shred of good news is something to be grateful
-for, and the outpouring of support we&#39;ve experienced during o...
+: В 2020 году даже самая маленькая хорошая 
новость...
 </p>
 <p>
 <!--#set var="link"
 value="<a 
href='http://www.fsf.org/blogs/community/a-tech-antitrust-hearing-misses-the-point'>"
 -->
 <!--#echo
 encoding="none" var="link" -->
-A tech antitrust hearing misses the point<!--#echo encoding="none"
+Прослушали антимонопольное дело<!--#echo 
encoding="none"
 var="a_close" -->
 <!-- TRANSLATORS: 
 http://www.fsf.org/blogs/community/a-tech-antitrust-hearing-misses-the-point 
-->
-: On July 29th, the CEOs of Google, Facebook, Apple, and Amazon were called
-before the US Senate Judiciary Committee to give testimony to lawmakers
-co...
+: 29 июля руководители Google, Facebook, Apple и Amazon 
были вызваны в
+Судебный комитет Сената США...
 </p>
 <p>
 <!--#set var="link"

Index: po/planetfeeds.ru.po
===================================================================
RCS file: /web/www/www/po/planetfeeds.ru.po,v
retrieving revision 1.1632
retrieving revision 1.1633
diff -u -b -r1.1632 -r1.1633
--- po/planetfeeds.ru.po        20 Aug 2020 16:57:59 -0000      1.1632
+++ po/planetfeeds.ru.po        20 Aug 2020 17:29:13 -0000      1.1633
@@ -14,7 +14,6 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2020-08-20 04:56+0000\n"
 
 #. type: Content of: <p>
 msgid "Thank you for helping us welcome over 200 new members"
@@ -26,8 +25,7 @@
 msgid ""
 ": In the year 2020, every shred of good news is something to be grateful "
 "for, and the outpouring of support we&#39;ve experienced during o..."
-msgstr ""
-": В 2020 году даже самая маленькая хорошая 
новость..."
+msgstr ": В 2020 году даже самая маленькая х
орошая новость..."
 
 #. type: Content of: <p>
 msgid "A tech antitrust hearing misses the point"

Index: proprietary/malware-google.ru.html
===================================================================
RCS file: /web/www/www/proprietary/malware-google.ru.html,v
retrieving revision 1.55
retrieving revision 1.56
diff -u -b -r1.55 -r1.56
--- proprietary/malware-google.ru.html  17 Aug 2020 10:32:07 -0000      1.55
+++ proprietary/malware-google.ru.html  20 Aug 2020 17:29:15 -0000      1.56
@@ -243,6 +243,13 @@
 предположение, что в престижных 
несвободных программах нет серьезных 
ошибок.</p>
 
 <ul class="blurbs">
+  <li id="M202008110">
+    <p>Компания TikTok <a
+href="https://boingboing.net/2020/08/11/tiktok-exploited-android-secur.html";>
+эксплуатировала уязвимость Android</a>, чтобы 
получать адреса MAC
+пользователей.</p>
+  </li>
+
   <li id="M201907080">
     <p>Многие приложения Android могут 
отслеживать перемещения пользователей, 
даже
 когда пользователь <a
@@ -631,7 +638,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Обновлено:
 
-$Date: 2020/08/17 10:32:07 $
+$Date: 2020/08/20 17:29:15 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary-insecurity.ru.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-insecurity.ru.html,v
retrieving revision 1.90
retrieving revision 1.91
diff -u -b -r1.90 -r1.91
--- proprietary/proprietary-insecurity.ru.html  24 Jun 2020 05:04:03 -0000      
1.90
+++ proprietary/proprietary-insecurity.ru.html  20 Aug 2020 17:29:15 -0000      
1.91
@@ -85,6 +85,13 @@
 <div class="column-limit" id="proprietary-insecurity"></div>
 
 <ul class="blurbs">
+  <li id="M202008110">
+    <p>Компания TikTok <a
+href="https://boingboing.net/2020/08/11/tiktok-exploited-android-secur.html";>
+эксплуатировала уязвимость Android</a>, чтобы 
получать адреса MAC
+пользователей.</p>
+  </li>
+
   <li id="M202006160">
     <p><a
 
href="https://www.wired.com/story/ripple20-iot-vulnerabilities/?bxid=5bd66d4c2ddf9c619437e4b8&amp;cndid=9608804&amp;esrc=Wired_etl_load&amp;source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&amp;utm_bran%5C";>
@@ -807,7 +814,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Обновлено:
 
-$Date: 2020/06/24 05:04:03 $
+$Date: 2020/08/20 17:29:15 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary.ru.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary.ru.html,v
retrieving revision 1.164
retrieving revision 1.165
diff -u -b -r1.164 -r1.165
--- proprietary/proprietary.ru.html     18 Aug 2020 12:00:56 -0000      1.164
+++ proprietary/proprietary.ru.html     20 Aug 2020 17:29:15 -0000      1.165
@@ -188,6 +188,13 @@
 <h3 id="latest">Последние добавления</h3>
 
 <ul class="blurbs">
+  <li id="M202008110">
+    <p>Компания TikTok <a
+href="https://boingboing.net/2020/08/11/tiktok-exploited-android-secur.html";>
+эксплуатировала уязвимость Android</a>, чтобы 
получать адреса MAC
+пользователей.</p>
+  </li>
+
   <li id="M202004200">
     <p>Информатор Томас ле Боннье сообщает, 
что Apple практикует скрытную активацию
 программы Siri, чтобы <a
@@ -238,20 +245,6 @@
 включать и выключать функции в автомобилях
</a> на расстоянии через
 универсальный черный ход.</p>
   </li>
-
-  <li id="M202006300">
-    <p>&ldquo;Программы для боссов&rdquo;&nbsp;&mdash; 
программы, которые боссы <a
-href="https://www.eff.org/deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers";>
-принуждают работников устанавливать на их 
собственных компьютерах</a>, чтобы
-боссы могли шпионить за ними.</p>
-
-    <p>Это показывает, почему требование 
&ldquo;согласия&rdquo; пользователя не
-является адекватным основанием для защиты 
личной жизни в цифровой
-сфере. Босс может принудить большинство 
работников согласиться почти на все,
-даже на контакт с заразной болезнью, 
который может быть смертельным. Такие
-программы должны быть незаконны, а боссы, 
которые их требуют, должны
-преследоваться за это по закону.</p>
-  </li>
 </ul>
 
 </div>
@@ -333,7 +326,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Обновлено:
 
-$Date: 2020/08/18 12:00:56 $
+$Date: 2020/08/20 17:29:15 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/po/malware-google.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.ru-en.html,v
retrieving revision 1.53
retrieving revision 1.54
diff -u -b -r1.53 -r1.54
--- proprietary/po/malware-google.ru-en.html    17 Aug 2020 10:32:07 -0000      
1.53
+++ proprietary/po/malware-google.ru-en.html    20 Aug 2020 17:29:15 -0000      
1.54
@@ -232,6 +232,13 @@
   bugs.</p>
 
 <ul class="blurbs">
+  <li id="M202008110">
+    <p>TikTok <a
+    
href="https://boingboing.net/2020/08/11/tiktok-exploited-android-secur.html";>
+    exploited an Android vulnerability</a> to obtain user MAC
+    addresses.</p>
+  </li>
+
   <li id="M201907080">
     <p>Many Android apps can track
     users' movements even when the user says <a
@@ -593,7 +600,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/08/17 10:32:07 $
+$Date: 2020/08/20 17:29:15 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/malware-google.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.ru.po,v
retrieving revision 1.122
retrieving revision 1.123
diff -u -b -r1.122 -r1.123
--- proprietary/po/malware-google.ru.po 20 Aug 2020 08:01:08 -0000      1.122
+++ proprietary/po/malware-google.ru.po 20 Aug 2020 17:29:15 -0000      1.123
@@ -16,7 +16,6 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2020-08-20 07:55+0000\n"
 
 #. type: Content of: <title>
 msgid "Google's Software Is Malware - GNU Project - Free Software Foundation"
@@ -414,6 +413,9 @@
 "secur.html\"> exploited an Android vulnerability</a> to obtain user MAC "
 "addresses."
 msgstr ""
+"Компания TikTok <a 
href=\"https://boingboing.net/2020/08/11/tiktok-exploited-";
+"android-secur.html\"> эксплуатировала уязвимость 
Android</a>, чтобы получать "
+"адреса MAC пользователей."
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""

Index: proprietary/po/proprietary-insecurity.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ru-en.html,v
retrieving revision 1.88
retrieving revision 1.89
diff -u -b -r1.88 -r1.89
--- proprietary/po/proprietary-insecurity.ru-en.html    24 Jun 2020 05:37:11 
-0000      1.88
+++ proprietary/po/proprietary-insecurity.ru-en.html    20 Aug 2020 17:29:15 
-0000      1.89
@@ -78,6 +78,13 @@
 <div class="column-limit" id="proprietary-insecurity"></div>
 
 <ul class="blurbs">
+  <li id="M202008110">
+    <p>TikTok <a
+    
href="https://boingboing.net/2020/08/11/tiktok-exploited-android-secur.html";>
+    exploited an Android vulnerability</a> to obtain user MAC
+    addresses.</p>
+  </li>
+
   <li id="M202006160">
     <p><a
     
href="https://www.wired.com/story/ripple20-iot-vulnerabilities/?bxid=5bd66d4c2ddf9c619437e4b8&amp;cndid=9608804&amp;esrc=Wired_etl_load&amp;source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&amp;utm_bran%5C";>
@@ -782,7 +789,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/06/24 05:37:11 $
+$Date: 2020/08/20 17:29:15 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary-insecurity.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ru.po,v
retrieving revision 1.249
retrieving revision 1.250
diff -u -b -r1.249 -r1.250
--- proprietary/po/proprietary-insecurity.ru.po 20 Aug 2020 08:01:09 -0000      
1.249
+++ proprietary/po/proprietary-insecurity.ru.po 20 Aug 2020 17:29:15 -0000      
1.250
@@ -16,7 +16,6 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2020-08-20 07:55+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Insecurity - GNU Project - Free Software Foundation"
@@ -126,6 +125,9 @@
 "secur.html\"> exploited an Android vulnerability</a> to obtain user MAC "
 "addresses."
 msgstr ""
+"Компания TikTok <a 
href=\"https://boingboing.net/2020/08/11/tiktok-exploited-";
+"android-secur.html\"> эксплуатировала уязвимость 
Android</a>, чтобы получать "
+"адреса MAC пользователей."
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""

Index: proprietary/po/proprietary.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru-en.html,v
retrieving revision 1.160
retrieving revision 1.161
diff -u -b -r1.160 -r1.161
--- proprietary/po/proprietary.ru-en.html       18 Aug 2020 12:00:57 -0000      
1.160
+++ proprietary/po/proprietary.ru-en.html       20 Aug 2020 17:29:15 -0000      
1.161
@@ -173,6 +173,13 @@
 <h3 id="latest">Latest additions</h3>
 
 <ul class="blurbs">
+  <li id="M202008110">
+    <p>TikTok <a
+    
href="https://boingboing.net/2020/08/11/tiktok-exploited-android-secur.html";>
+    exploited an Android vulnerability</a> to obtain user MAC
+    addresses.</p>
+  </li>
+
   <li id="M202004200">
     <p>Apple whistleblower Thomas Le Bonniec reports that Apple
     made a practice of surreptitiously activating the Siri software to <a
@@ -224,19 +231,6 @@
     enable and disable functionality in cars</a> through a universal
     back door.</p>
   </li>
-
-  <li id="M202006300">
-    <p>&ldquo;Bossware&rdquo; is malware that bosses <a
-    
href="https://www.eff.org/deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers";>
-    coerce workers into installing in their own computers</a>, so the
-    bosses can spy on them.</p>
-
-    <p>This shows why requiring the user's &ldquo;consent&rdquo; is not
-    an adequate basis for protecting digital privacy.  The boss can coerce
-    most workers into consenting to almost anything, even probable exposure
-    to contagious disease that can be fatal.  Software like this should
-    be illegal and bosses that demand it should be prosecuted for it.</p>
-  </li>
 </ul>
 
 </div>
@@ -298,7 +292,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/08/18 12:00:57 $
+$Date: 2020/08/20 17:29:15 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.380
retrieving revision 1.381
diff -u -b -r1.380 -r1.381
--- proprietary/po/proprietary.ru.po    20 Aug 2020 08:01:09 -0000      1.380
+++ proprietary/po/proprietary.ru.po    20 Aug 2020 17:29:15 -0000      1.381
@@ -16,7 +16,6 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2020-08-20 07:55+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -317,6 +316,9 @@
 "secur.html\"> exploited an Android vulnerability</a> to obtain user MAC "
 "addresses."
 msgstr ""
+"Компания TikTok <a 
href=\"https://boingboing.net/2020/08/11/tiktok-exploited-";
+"android-secur.html\"> эксплуатировала уязвимость 
Android</a>, чтобы получать "
+"адреса MAC пользователей."
 
 #. type: Content of: <div><ul><li><p>
 msgid ""

Index: software/recent-releases-include.ru.html
===================================================================
RCS file: /web/www/www/software/recent-releases-include.ru.html,v
retrieving revision 1.1989
retrieving revision 1.1990
diff -u -b -r1.1989 -r1.1990
--- software/recent-releases-include.ru.html    18 Aug 2020 17:01:20 -0000      
1.1989
+++ software/recent-releases-include.ru.html    20 Aug 2020 17:29:15 -0000      
1.1990
@@ -1,15 +1,15 @@
 
 <!--#set var="LINK_CLOSE" value="</a>, <i>" -->
 <ul>
-<li><strong>August 18, 2020</strong>
+<li><strong>18 августа 2020</strong>
 <ul>
 <li><!--#set var="LINK" 
 value='<a href="//lists.gnu.org/archive/html/info-gnu/2020-08/msg00007.html">' 
-->
 <!--#echo 
 encoding="none" var="LINK" -->
-Release of GNU MPC 1.2.0<!--#echo 
+Выпуск GNU MPC 1.2.0<!--#echo 
 encoding="none" var="LINK_CLOSE" -->
-Andreas Enge<!--#set 
+Андреас Энге<!--#set 
 var="TIME" value="</i>, <tt>12:35</tt>" -->
 <!--#echo encoding="none" var="TIME" -->
 </li>

Index: software/po/recent-releases-include.ru.po
===================================================================
RCS file: /web/www/www/software/po/recent-releases-include.ru.po,v
retrieving revision 1.2821
retrieving revision 1.2822
diff -u -b -r1.2821 -r1.2822
--- software/po/recent-releases-include.ru.po   20 Aug 2020 16:58:00 -0000      
1.2821
+++ software/po/recent-releases-include.ru.po   20 Aug 2020 17:29:16 -0000      
1.2822
@@ -14,11 +14,8 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2020-08-18 16:57+0000\n"
 
 #. type: Content of: <ul><li>
-# | <strong>August 1[-5-]{+8+}, 2020</strong>
-#| msgid "<strong>August 15, 2020</strong>"
 msgid "<strong>August 18, 2020</strong>"
 msgstr "<strong>18 августа 2020</strong>"
 



reply via email to

[Prev in Thread] Current Thread [Next in Thread]