malware-webpages.de.po

Mismatched links: 29.

Mismatched ids: 0.

#text
8 | {+</a>&nbsp;/+} <a [-href="/proprietary/proprietary.html">Other examples
| of proprietary malware</a>-]
| {+href="/proprietary/proprietary.html">Malware</a>&nbsp;/ By
| product&nbsp;/+} 
</a>&nbsp;/ <a href="/proprietary/proprietary.html">Malware</a>&nbsp;/ By product&nbsp;/ 
<a href="/proprietary/">Weitere Beispiele proprietärer Schadsoftware</a> 
10 | Nonfree (proprietary) software is very often malware (designed to mistreat
| the user). Nonfree software is controlled by its developers, which puts
| them in a position of power over the users; <a
| href="/philosophy/free-software-even-more-important.html">that is the
| basic injustice</a>. The developers {+and manufacturers+} often exercise
| that power to the detriment of the users they ought to serve. 
Nonfree (proprietary) software is very often malware (designed to mistreat the user). Nonfree software is controlled by its developers, which puts them in a position of power over the users; <a href="/philosophy/free-software-even-more-important.html">that is the basic injustice</a>. The developers and manufacturers often exercise that power to the detriment of the users they ought to serve. 
Unfreie (proprietäre) Software entspricht sehr häufig einem Schadprogramm (entworfen, um <ins>unerwünschte und gegebenenfalls schädliche Funktionen auszuführen,</ins> den Benutzer also schlecht behandeln). Unfreie Software wird von den Entwicklern kontrolliert, welches sie in eine Position der Macht gegenüber den Nutzern versetzt. <a href="/philosophy/free-software-even-more-important">Das ist die grundlegende Ungerechtigkeit!</a> Häufig üben Entwickler diese Macht zum Schaden der Benutzer aus, denen sie eigentlich dienen sollte. 
14 | Many web sites {+use JavaScript code+} <a
| href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081">
| {+to+} snoop on information that users have typed into a form but not
| [-sent</a>.-] {+sent</a>, in order to learn their identity. Some are <a
| href="https://www.manatt.com/insights/newsletters/advertising-law/sites-illegally-tracked-consumers-new-suits-allege">
| getting sued</a> for this.+} 
Many web sites use JavaScript code <a href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081"> to snoop on information that users have typed into a form but not sent</a>, in order to learn their identity. Some are <a href="https://www.manatt.com/insights/newsletters/advertising-law/sites-illegally-tracked-consumers-new-suits-allege"> getting sued</a> for this. 
Viele Präsenzen <a href="https://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081" title="Kashmir Hill und Surya Mattu, Before You Hit 'Submit,' This Company Has Already Logged Your Personal Data, unter: https://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081, Gizmodo 2017.">schnüffeln bereits Information aus, die Besucher erst in Formulare eingegeben, aber noch gar nicht gesendet haben</a>. 
15  
The chat facilities of some customer services use the same sort of malware to <a href="https://gizmodo.com/be-warned-customer-service-agents-can-see-what-youre-t-1830688119"> read what the user is typing before it is posted</a>. 
 
16  
British Airways used <a href="https://www.theverge.com/2018/7/19/17591732/british-airways-gdpr-compliance-twitter-personal-data-security">nonfree JavaScript on its web site to give other companies personal data on its customers</a>. 
 
18  
A cracker used an exploit in outdated software to <a href="https://www.pcmag.com/news/360968/400-websites-secretly-served-cryptocurrency-miners-to-visito"> inject a &ldquo;miner&rdquo; in web pages</a> served to visitors. This type of malware hijacks the computer's processor to mine a cryptocurrency. 
 
19  
<small>(Note that the article refers to the infected software as &ldquo;content management system&rdquo;. A better term would be &ldquo;<a href="/philosophy/words-to-avoid.html#Content">website revision system</a>&rdquo;.)</small> 
 
20  
Since the miner was a nonfree JavaScript program, visitors wouldn't have been affected if they had used <a href="/software/librejs/index.html">LibreJS</a>. Some browser extensions that <a href="https://www.cnet.com/tech/computing/how-to-stop-sites-from-using-your-cpu-to-mine-coins/"> specifically block JavaScript miners</a> are also available. 
 
26  
A <a href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf"> research paper</a> that investigated the privacy and security of 283 Android VPN apps concluded that &ldquo;in spite of the promises for privacy, security, and anonymity given by the majority of VPN apps&mdash;millions of users may be unawarely subject to poor security guarantees and abusive practices inflicted by VPN apps.&rdquo; 
Eine <a href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf" title="An Analysis of the Privacy and Security Risks of Android VPN Permission-enabled Apps, unter: https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf IMC 2016.">Studie</a>, in der Privatsphäre und Sicherheit von 283 Android-VPN-Apps untersucht wurden, kam zu dem Schluss, dass trotz der von den meisten VPN-Apps gegebenen Versprechen betreffend Privatsphäre, Sicherheit und Anonymität <a href="https://arstechnica.com/security/2017/01/majority-of-android-vpns-cant-be-trusted-to-make-users-more-secure/" title="Majority of Android VPNs can’t be trusted to make users more secure, unter: https://arstechnica.com/information-technology/2017/01/majority-of-android-vpns-cant-be-trusted-to-make-users-more-secure/ Ars Technica 2017.">„Millionen Nutzer unbewusst schlechten Sicherheitsgarantien und missbräuchlichen Praktiken, die von VPN-Apps verursacht werden, unterliegen könnten.“</a> 
32  
E-books can contain JavaScript code, and <a href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"> sometimes this code snoops on readers</a>. 
E-Bücher können JavaScript-Funktionen enthalten, und <a href="https://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds" title="Men make up their minds about books faster than women, study finds, unter: https://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds The Guardian 2017.">so die Leserschaft bisweilen ausschnüffeln</a>. 
33 | Flash and JavaScript are [-also-] used for <a
| href="http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/">
| &ldquo;fingerprinting&rdquo; devices</a> to identify users. 
Flash and JavaScript are used for <a href="http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/"> &ldquo;fingerprinting&rdquo; devices</a> to identify users. 
Flash und JavaScript werden ebenso für <a href="//arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/" title="Top sites (and maybe the NSA) track users with “device fingerprinting”, unter: arstechnica.com 2013.">„Fingerabdruck“-Geräte</a> zur Identifizierung von Nutzern verwendet. 
35 | Many web sites report all their visitors to Google by using the Google
| Analytics service, which <a
| href="http://www.pcworld.idg.com.au/article/434164/google_analytics_breaks_norwegian_privacy_laws_local_agency_said/">
| tells Google the IP address and the page that was [-visited.</a>-]
| {+visited</a>.+} 
Many web sites report all their visitors to Google by using the Google Analytics service, which <a href="http://www.pcworld.idg.com.au/article/434164/google_analytics_breaks_norwegian_privacy_laws_local_agency_said/"> tells Google the IP address and the page that was visited</a>. 
Viele Internetpräsenzen berichten all ihre Besucher mithilfe des Google Analytics-Dienstes an Google, der <a href="//www.pcworld.idg.com.au/article/434164/google_analytics_breaks_norwegian_privacy_laws_local_agency_said/" title="Google Analytics breaks Norwegian privacy laws, local agency said, unter: pcworld.idg.com.au 2012.">Google die IP-Addresse und die besuchte Internetseite mitteilt</a>. 
37  
Pages that contain &ldquo;Like&rdquo; buttons <a href="https://www.smh.com.au/technology/facebooks-privacy-lie-aussie-exposes-tracking-as-new-patent-uncovered-20111004-1l61i.html"> enable Facebook to track visitors to those pages</a>&mdash;even users that don't have Facebook accounts. 
Internetseiten, die <em>Gefällt mir</em>-Schaltflächen enthalten, <a href="/https://www.smh.com.au/technology/facebooks-privacy-lie-aussie-exposes-tracking-as-new-patent-uncovered-20111004-1l61i.html" title="Facebook's privacy lie: Aussie exposes 'tracking' as new patent uncovered, unter: smh.com.au 2011-">ermöglichen Facebook, Besucher jener Seiten zu verfolgen</a>&#160;&#8209;&#160;sogar Nutzer, die keine Facebook-Konten haben. 
38 | Flash Player's <a
| [-href="http://www.imasuper.com/66/technology/flash-cookies-the-silent-privacy-killer/">-]
| {+href="https://web.archive.org/web/20200808151607/http://www.imasuper.com/2008/10/09/flash-cookies-the-silent-privacy-killer/">+}
| cookie feature helps web sites track visitors</a>. 
Flash Player's <a href="https://web.archive.org/web/20200808151607/http://www.imasuper.com/2008/10/09/flash-cookies-the-silent-privacy-killer/"> cookie feature helps web sites track visitors</a>. 
Flash Player-Funktion hilft <a href="//www.imasuper.com/66/technology/flash-cookies-the-silent-privacy-killer/" title="Flash Cookies: The Silent Privacy Killer, unter: imasuper.com 2008.">Besucher von Internetpräsenzen mittels Flash-Cookie zu verfolgen</a>. 
39 TRANSLATORS: Use space (SPC) as msgstr if you don't have notes. 
*GNUN-SLOT: TRANSLATOR'S NOTES* 
<p><strong>Anmerkungen des Übersetzungsteams:</strong></p>

<p class="noteClass">
<!-- @Übersetzer: Diesen Absatz bitte entfernen, wenn Dokument von Dritten Korrektur gelesen ist. -->
Dieses Dokument wurde (noch) nicht von <a href="//savannah.gnu.org/projects/www-de">www-de</a>-Mitgliedern und/oder interessierten Mitwirkenden begutachtet. Bitte unterstützen Sie uns dieses hinsichtlich Rechtschreibung, Grammatik, Typografie, Stil und sachlicher Richtigkeit zu überprüfen und melden Korrekturvorschläge an <a href="mailto:www-de-translators@gnu.org?subject=proprietary/malware-webpages.html: Korrekturvorschlag">&lt;www-de-translators@gnu.org&gt;</a>.</p> 
41 || No change detected. The change might only be in amounts of spaces. 
Please see the <a href="/server/standards/README.translations.html">Translations README</a> for information on coordinating and contributing translations of this article. 
Bei der Übersetzung dieses Werkes wurde mit größter Sorgfalt vorgegangen. Trotzdem können Fehler nicht völlig ausgeschlossen werden. Sollten Sie Fehler bemerken oder Vorschläge, Kommentare oder Fragen zu diesem Dokument haben, wenden Sie sich bitte an unser Übersetzungsteam <a href="mailto:web-translators@gnu.org?cc=www-de-translators@gnu.org">&lt;web-translators@gnu.org&gt;</a>.</p>
<p>Weitere Informationen über die Koordinierung und Einsendung von Übersetzungen unserer Internetpräsenz finden Sie in der <a href="/server/standards/README.translations">LIESMICH für Übersetzungen</a>. 
43  
This page is licensed under a <a rel="license" href="http://creativecommons.org/licenses/by/4.0/">Creative Commons Attribution 4.0 International License</a>. 
Dieses Werk ist lizenziert unter einer <a rel="license" href="//creativecommons.org/licenses/by/4.0/deed.de">Creative Commons Namensnennung 4.0 International</a>-Lizenz.