www-tr-internal
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[www-tr-internal] www-tr/philosophy can-you-trust.tr.po


From: Tahir Emre KALAYCI
Subject: [www-tr-internal] www-tr/philosophy can-you-trust.tr.po
Date: Thu, 17 Dec 2009 13:01:05 +0000

CVSROOT:        /cvsroot/www-tr
Module name:    www-tr
Changes by:     Tahir Emre KALAYCI <tekrei>     09/12/17 13:01:05

Modified files:
        philosophy     : can-you-trust.tr.po 

Log message:
        Kitaptaki çeviri ile güncellendi.

CVSWeb URLs:
http://cvs.savannah.gnu.org/viewcvs/www-tr/philosophy/can-you-trust.tr.po?cvsroot=www-tr&r1=1.1&r2=1.2

Patches:
Index: can-you-trust.tr.po
===================================================================
RCS file: /cvsroot/www-tr/www-tr/philosophy/can-you-trust.tr.po,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -b -r1.1 -r1.2
--- can-you-trust.tr.po 16 Dec 2009 19:04:35 -0000      1.1
+++ can-you-trust.tr.po 17 Dec 2009 13:01:04 -0000      1.2
@@ -8,8 +8,8 @@
 msgstr ""
 "Project-Id-Version: can-you-trust.html\n"
 "POT-Creation-Date: 2009-12-16 04:25-0500\n"
-"PO-Revision-Date: 2009-12-16 19:49+0100\n"
-"Last-Translator: Ali Servet Donmez <address@hidden>\n"
+"PO-Revision-Date: 2009-12-17 12:12+0200\n"
+"Last-Translator: Tahir Emre Kalaycı <address@hidden>\n"
 "Language-Team: Turkish <address@hidden>\n"
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
@@ -17,306 +17,127 @@
 "Plural-Forms: nplurals=1; plural=0;\n"
 
 # type: Content of: <title>
-msgid ""
-"Can You Trust Your Computer? - GNU Project - Free Software Foundation (FSF)"
-msgstr ""
+msgid "Can You Trust Your Computer? - GNU Project - Free Software Foundation 
(FSF)"
+msgstr "Bilgisayarınıza Güvenebilir misiniz? - GNU Projesi - Özgür 
Yazılım Vakfı (FSF)"
 
 # type: Content of: <h2>
 msgid "Can You Trust Your Computer?"
-msgstr ""
+msgstr "Bilgisayarınıza Güvenebilir misiniz?"
 
 # type: Content of: <p>
 msgid "by <a href=\"http://www.stallman.org/\";>Richard Stallman</a>"
-msgstr ""
+msgstr "Yazan: <a href=\"http://www.stallman.org/\";>Richard Stallman</a>"
 
 # type: Content of: <p>
-msgid ""
-"Who should your computer take its orders from? Most people think their "
-"computers should obey them, not obey someone else.  With a plan they call "
-"&ldquo;trusted computing&rdquo;, large media corporations (including the "
-"movie companies and record companies), together with computer companies such "
-"as Microsoft and Intel, are planning to make your computer obey them instead "
-"of you.  (Microsoft's version of this scheme is called &ldquo;"
-"Palladium&rdquo;.)  Proprietary programs have included malicious features "
-"before, but this plan would make it universal."
-msgstr ""
+msgid "Who should your computer take its orders from? Most people think their 
computers should obey them, not obey someone else.  With a plan they call 
&ldquo;trusted computing&rdquo;, large media corporations (including the movie 
companies and record companies), together with computer companies such as 
Microsoft and Intel, are planning to make your computer obey them instead of 
you.  (Microsoft's version of this scheme is called &ldquo;Palladium&rdquo;.)  
Proprietary programs have included malicious features before, but this plan 
would make it universal."
+msgstr "Bilgisayarınız emirleri kimden almalıdır? Birçok insan 
bilgisayarlarının, başka birilerinin değil, kendi emirlerine uymasını 
ister. &ldquo;güvenli işletim&rdquo; [:trusted computing] olarak 
adlandırdıkları bir planla, Microsoft ve Intel gibi bilgisayar firmalarıyla 
birlikte büyük medya kuruluşları (film firmaları ve müzik firmaları 
dahil olmak üzere) bilgisayarlarınızın sizin yerine kendilerine uymasını 
planlamaktadır. Özel mülk programlar daha önce kötü niyetli özelliklere 
sahipti ancak bu plan onu evrensel hale getirecektir"
 
 # type: Content of: <p>
-msgid ""
-"Proprietary software means, fundamentally, that you don't control what it "
-"does; you can't study the source code, or change it.  It's not surprising "
-"that clever businessmen find ways to use their control to put you at a "
-"disadvantage.  Microsoft has done this several times: one version of Windows "
-"was designed to report to Microsoft all the software on your hard disk; a "
-"recent &ldquo;security&rdquo; upgrade in Windows Media Player required users "
-"to agree to new restrictions.  But Microsoft is not alone: the KaZaa music-"
-"sharing software is designed so that KaZaa's business partner can rent out "
-"the use of your computer to its clients.  These malicious features are often "
-"secret, but even once you know about them it is hard to remove them, since "
-"you don't have the source code."
-msgstr ""
+msgid "Proprietary software means, fundamentally, that you don't control what 
it does; you can't study the source code, or change it.  It's not surprising 
that clever businessmen find ways to use their control to put you at a 
disadvantage.  Microsoft has done this several times: one version of Windows 
was designed to report to Microsoft all the software on your hard disk; a 
recent &ldquo;security&rdquo; upgrade in Windows Media Player required users to 
agree to new restrictions.  But Microsoft is not alone: the KaZaa music-sharing 
software is designed so that KaZaa's business partner can rent out the use of 
your computer to its clients.  These malicious features are often secret, but 
even once you know about them it is hard to remove them, since you don't have 
the source code."
+msgstr "Özel mülk yazılım temel olarak bilgisayarın ne yaptığını 
kontrol edemediğiniz anlamına gelmektedir; kaynak kodunda çalışamaz ya da 
onu değiştiremezsiniz. Akıllı iş adamlarının, sizi dezavantajlı duruma 
sokmak için yollar bulması şaşırtıcı değildir. Microsoft bunu defalarca 
yapmıştır: Windows’un bir sürümü, hard diskinizdeki tüm yazılımı 
raporlayacak şekilde tasarlanmıştır; Windows Medya Player’daki yakın 
zamandaki bir &ldquo;güvenlik&rdquo; yükseltmesi, kullanıcıların yeni 
kısıtlamalara uymasını gerektirmiştir. Ancak Microsoft bu konuda yalnız 
değildir: KaZaa müzik paylaşım yazılımı, bilgisayarınızın 
kullanımını KaZaa’nın iş ortağının müşterilerine kiralayacak 
şekilde tasarlanmıştır. Bu kötü niyetli özellikler genellikle sırdır 
ama bunları bilseniz, ortadan kaldırmanız zordur çünkü kaynak koduna 
sahip değilsiniz."
 
 # type: Content of: <p>
-msgid ""
-"In the past, these were isolated incidents.  &ldquo;Trusted computing&rdquo; "
-"would make the practice pervasive.  &ldquo;Treacherous computing&rdquo; is a "
-"more appropriate name, because the plan is designed to make sure your "
-"computer will systematically disobey you.  In fact, it is designed to stop "
-"your computer from functioning as a general-purpose computer.  Every "
-"operation may require explicit permission."
-msgstr ""
+msgid "In the past, these were isolated incidents.  &ldquo;Trusted 
computing&rdquo; would make the practice pervasive.  &ldquo;Treacherous 
computing&rdquo; is a more appropriate name, because the plan is designed to 
make sure your computer will systematically disobey you.  In fact, it is 
designed to stop your computer from functioning as a general-purpose computer.  
Every operation may require explicit permission."
+msgstr "Geçmişte, bunlar ayrı olaylardı. &ldquo;güvenli işletim&rdquo;, 
açıklığı sağlamaktaydı. &ldquo;Güvenilmez işletim&rdquo; [:treacherous 
computing] bunun için daha uygun bir isimdir çünkü plan, 
bilgisayarınızın size her zaman sistematik olarak uymamasının sağlanması 
için tasarlanmıştır. Gerçekte, bilgisayarınızın genel amaçlı bir 
bilgisayar olarak çalışmasını durdurmak için tasarlanmıştır. Her 
işlem, açık izin gerektirebilir."
 
 # type: Content of: <p>
-msgid ""
-"The technical idea underlying treacherous computing is that the computer "
-"includes a digital encryption and signature device, and the keys are kept "
-"secret from you.  Proprietary programs will use this device to control which "
-"other programs you can run, which documents or data you can access, and what "
-"programs you can pass them to.  These programs will continually download new "
-"authorization rules through the Internet, and impose those rules "
-"automatically on your work.  If you don't allow your computer to obtain the "
-"new rules periodically from the Internet, some capabilities will "
-"automatically cease to function."
-msgstr ""
+msgid "The technical idea underlying treacherous computing is that the 
computer includes a digital encryption and signature device, and the keys are 
kept secret from you.  Proprietary programs will use this device to control 
which other programs you can run, which documents or data you can access, and 
what programs you can pass them to.  These programs will continually download 
new authorization rules through the Internet, and impose those rules 
automatically on your work.  If you don't allow your computer to obtain the new 
rules periodically from the Internet, some capabilities will automatically 
cease to function."
+msgstr "Güvenilmez işletimin altındaki teknik fikir, bilgisayarın sayısal 
bir şifreleme ve imza cihazını içermesi ve tuşların sizden gizli 
tutulmasıdır (Microsoft’un bu sürümü &ldquo;palladyum&rdquo; olarak 
adlandırılır). Özel mülk programlar, başka hangi programları 
çalıştırabileceğinizi, hangi belgelere ya da verilere erişebileceğinizi 
ve bunları ne gibi programlara aktarabileceğinizi kontrol etmek için bu 
cihazı kullanır. Bu programlar, İnternetten yeni yetkilendirme kurallarını 
indirecek ve bu kuralları çalışmanıza otomatik olarak dayatacaktır. 
Bilgisayarınızın yeni kuralları İnternetten düzenli olarak almasına izin 
vermezseniz, bazı özellikler otomatik olarak görevini yapmayı 
durduracaktır."
 
 # type: Content of: <p>
-msgid ""
-"Of course, Hollywood and the record companies plan to use treacherous "
-"computing for Digital Restrictions Management (DRM), so that downloaded "
-"videos and music can be played only on one specified computer.  Sharing will "
-"be entirely impossible, at least using the authorized files that you would "
-"get from those companies.  You, the public, ought to have both the freedom "
-"and the ability to share these things.  (I expect that someone will find a "
-"way to produce unencrypted versions, and to upload and share them, so DRM "
-"will not entirely succeed, but that is no excuse for the system.)"
-msgstr ""
+msgid "Of course, Hollywood and the record companies plan to use treacherous 
computing for Digital Restrictions Management (DRM), so that downloaded videos 
and music can be played only on one specified computer.  Sharing will be 
entirely impossible, at least using the authorized files that you would get 
from those companies.  You, the public, ought to have both the freedom and the 
ability to share these things.  (I expect that someone will find a way to 
produce unencrypted versions, and to upload and share them, so DRM will not 
entirely succeed, but that is no excuse for the system.)"
+msgstr "Tabi ki, Hollywood ve müzik firmaları “DRM” (Sayısal 
Kısıtlama Yönetimi) içingüvenilmez işletimi kullanmayı planlamaktadır, 
böylece indirilen videolar vemüzik, yalnızca belirtilen tek bir bilgisayar 
üzerinde oynatılabilir. En azındanbu firmalardan alacağınız 
yetkilendirilmiş dosyalar kullanılarak paylaşım ta-mamen imkansız hale 
gelecektir. Ancak sizin yani halkın bu şeyleri paylaş-ma özgürlüğünüz 
ve yeteneğiniz olmalıdır (Birilerinin şifrelenmemiş sürüm-leri üretmek, 
yüklemek ve paylaşmak için bir yol bulmasını bekliyorum, böy-lece DRM 
tamamen başarılı olmayacaktır ancak sistem aklanmış değildir)."
 
 # type: Content of: <p>
-msgid ""
-"Making sharing impossible is bad enough, but it gets worse.  There are plans "
-"to use the same facility for email and documents&mdash;resulting in email "
-"that disappears in two weeks, or documents that can only be read on the "
-"computers in one company."
-msgstr ""
+msgid "Making sharing impossible is bad enough, but it gets worse.  There are 
plans to use the same facility for email and documents&mdash;resulting in email 
that disappears in two weeks, or documents that can only be read on the 
computers in one company."
+msgstr "Paylaşımın imkansız hale getirilmesi yeterince kötüdür ancak 
durum daha da kötüleşmektedir. E-posta ve belgeler için de aynı 
özelliğin kullanılmasına ilişkin planlar vardır, iki hafta içinde 
ortadan kaybolan e-postalar ya da bir firmada yalnızca seçilen 
bilgisayarlarda okunabilen belgeler gibi."
 
 # type: Content of: <p>
-msgid ""
-"Imagine if you get an email from your boss telling you to do something that "
-"you think is risky; a month later, when it backfires, you can't use the "
-"email to show that the decision was not yours.  &ldquo;Getting it in "
-"writing&rdquo; doesn't protect you when the order is written in disappearing "
-"ink."
-msgstr ""
+msgid "Imagine if you get an email from your boss telling you to do something 
that you think is risky; a month later, when it backfires, you can't use the 
email to show that the decision was not yours.  &ldquo;Getting it in 
writing&rdquo; doesn't protect you when the order is written in disappearing 
ink."
+msgstr "Patronunuzun sizden riskli bir iş yapmanızı istediğini hayal edin; 
bir ay sonra, iş olumsuz sonuç verdiğinde, kararın size ait olmadığını 
göstermek için e-postayı kullanamazsınız. Emir size ortadan uçan 
mürekkeple verildiğinde, “yazılı olarak emir almak” sizi korumaz."
 
 # type: Content of: <p>
-msgid ""
-"Imagine if you get an email from your boss stating a policy that is illegal "
-"or morally outrageous, such as to shred your company's audit documents, or "
-"to allow a dangerous threat to your country to move forward unchecked.  "
-"Today you can send this to a reporter and expose the activity.  With "
-"treacherous computing, the reporter won't be able to read the document; her "
-"computer will refuse to obey her.  Treacherous computing becomes a paradise "
-"for corruption."
-msgstr ""
+msgid "Imagine if you get an email from your boss stating a policy that is 
illegal or morally outrageous, such as to shred your company's audit documents, 
or to allow a dangerous threat to your country to move forward unchecked.  
Today you can send this to a reporter and expose the activity.  With 
treacherous computing, the reporter won't be able to read the document; her 
computer will refuse to obey her.  Treacherous computing becomes a paradise for 
corruption."
+msgstr "Patronunuzdan yasal olmayan ya da ahlaken kötü bir politikayı ifade 
eden bir e-posta aldığınızı hayal edin, örneğin, bu e-posta, firmanın 
yıllık denetim raporlarının parçalanması ya da ülkeniz için ciddi bir 
tehdit oluşturacak olan bir durumu içerebilir. Bugün bunu bir muhabire 
gönderebilir ve eylemi açığavurabilirsiniz. Güvenilmez işletimle, 
gazeteci belgeyi okuyamayacak; bilgisayarı buna izin vermeyecektir. 
Güvenilmez işletim, tahrip için bir cennet haline gelir."
 
 # type: Content of: <p>
-msgid ""
-"Word processors such as Microsoft Word could use treacherous computing when "
-"they save your documents, to make sure no competing word processors can read "
-"them.  Today we must figure out the secrets of Word format by laborious "
-"experiments in order to make free word processors read Word documents.  If "
-"Word encrypts documents using treacherous computing when saving them, the "
-"free software community won't have a chance of developing software to read "
-"them&mdash;and if we could, such programs might even be forbidden by the "
-"Digital Millennium Copyright Act."
-msgstr ""
+msgid "Word processors such as Microsoft Word could use treacherous computing 
when they save your documents, to make sure no competing word processors can 
read them.  Today we must figure out the secrets of Word format by laborious 
experiments in order to make free word processors read Word documents.  If Word 
encrypts documents using treacherous computing when saving them, the free 
software community won't have a chance of developing software to read 
them&mdash;and if we could, such programs might even be forbidden by the 
Digital Millennium Copyright Act."
+msgstr "Microsoft Word gibi kelime işlemcileri, belgelerinizi kaydederken 
güvenilmez işletimi kullanabilir, bu nedenle, rekabet eden diğer kelime 
işlemcileri sizin belgelerinizi okuyamaz. Bugün, özgür kelime 
işlemcilerinin Word belgelerini okumalarını sağlamak için Word biçiminin 
sırlarını deneysel çalışmalarla anlamalıyız. Word, kaydederken, 
güvenilmez işletim ile belgeleri şifreliyorsa, özgür yazılım, bunları 
okumak için yazılım geliştirme şansına sahip olmayacaktır ve bunu 
başarabilsek bile, bu gibi programlar, Dijital Milenyum Telif Hakkı Hareketi 
tarafından yasaklanabilir."
 
 # type: Content of: <p>
-msgid ""
-"Programs that use treacherous computing will continually download new "
-"authorization rules through the Internet, and impose those rules "
-"automatically on your work.  If Microsoft, or the US government, does not "
-"like what you said in a document you wrote, they could post new instructions "
-"telling all computers to refuse to let anyone read that document.  Each "
-"computer would obey when it downloads the new instructions.  Your writing "
-"would be subject to 1984-style retroactive erasure.  You might be unable to "
-"read it yourself."
-msgstr ""
+msgid "Programs that use treacherous computing will continually download new 
authorization rules through the Internet, and impose those rules automatically 
on your work.  If Microsoft, or the US government, does not like what you said 
in a document you wrote, they could post new instructions telling all computers 
to refuse to let anyone read that document.  Each computer would obey when it 
downloads the new instructions.  Your writing would be subject to 1984-style 
retroactive erasure.  You might be unable to read it yourself."
+msgstr "Güvenilmez işletimi kullanan programlar, İnternetten sürekli 
olarak yeni yetkilendirme kuralları indirecek ve bu kuralları otomatik olarak 
çalışmanıza dayatacaklardır. Microsoft ya da A.B.D. hükümeti, yazmış 
olduğunuz bir belgede söylediğiniz bir şeyi sevmiyorsa, herhangi birinin 
söz konusu belgeyi okumasına izin verilmemesini tüm bilgisayarlara söyleyen 
yeni yönergeleri gönderebilirler. Yeni yönergeleri indirdiğinde her bir 
bilgisayar kurallara uyacaktır. Yazılarınız 1984 tarzı, önceki olayları 
kapsayan silintilere tabi tutulacaktır. Bunu kendiniz okuyamayabilirsiniz."
 
 # type: Content of: <p>
-msgid ""
-"You might think you can find out what nasty things a treacherous-computing "
-"application does, study how painful they are, and decide whether to accept "
-"them.  Even if you can find this out, it would be foolish to accept the "
-"deal, but you can't even expect the deal to stand still.  Once you come to "
-"depend on using the program, you are hooked and they know it; then they can "
-"change the deal.  Some applications will automatically download upgrades "
-"that will do something different&mdash;and they won't give you a choice "
-"about whether to upgrade."
-msgstr ""
+msgid "You might think you can find out what nasty things a 
treacherous-computing application does, study how painful they are, and decide 
whether to accept them.  Even if you can find this out, it would be foolish to 
accept the deal, but you can't even expect the deal to stand still.  Once you 
come to depend on using the program, you are hooked and they know it; then they 
can change the deal.  Some applications will automatically download upgrades 
that will do something different&mdash;and they won't give you a choice about 
whether to upgrade."
+msgstr "Güvenilmez bir bilgisayar uygulamasının ne gibi kötü şeyler 
yaptığını bulacağınızı, ne kadar ıstıraplı olduklarını 
öğreneceğinizi ve onları kabul edip etmeyeceğinizi düşünebilirsiniz. 
Bunun kabul edilmesi aptalca ve öngörüsüzce olacaktır ancak temel nokta, 
göstermekte olduğunuz çabanın yeterli olmayacağıdır. Bir kere programa 
güvendiğinizde, oltaya düşersiniz ve bunu bilirler; o zaman anlaşmayı 
değiştirebilirler. Bazı uygulamalar farklı bir şeyler yapacak olan 
yükseltmeleri otomatik olarak indirecektir, ve onlar, size yükseltip 
yükseltmeme konusunda seçim şansı vermeyecektir."
 
 # type: Content of: <p>
-msgid ""
-"Today you can avoid being restricted by proprietary software by not using "
-"it.  If you run GNU/Linux or another free operating system, and if you avoid "
-"installing proprietary applications on it, then you are in charge of what "
-"your computer does.  If a free program has a malicious feature, other "
-"developers in the community will take it out, and you can use the corrected "
-"version.  You can also run free application programs and tools on nonfree "
-"operating systems; this falls short of fully giving you freedom, but many "
-"users do it."
-msgstr ""
+msgid "Today you can avoid being restricted by proprietary software by not 
using it.  If you run GNU/Linux or another free operating system, and if you 
avoid installing proprietary applications on it, then you are in charge of what 
your computer does.  If a free program has a malicious feature, other 
developers in the community will take it out, and you can use the corrected 
version.  You can also run free application programs and tools on nonfree 
operating systems; this falls short of fully giving you freedom, but many users 
do it."
+msgstr "Bugün özel mülk yazılım tarafından sınırlandırılmaktan özel 
mülk yazılımı kullanmayarak kurtulabilirsiniz. GNU/Linux ya da başka bir 
özgür yazılım sistemini kullanırsanız ve üzerine özel mülk 
yazılımları kopyalamazsanız, o zaman bilgisayarınızın ne yaptığını 
kontrol edebilirsiniz. Özgür bir yazılım kötü niyetli bir özelliğe 
sahipse, topluluktaki diğer geliştiriciler, bunu çıkartırlar ve siz 
düzeltilmiş sürümünü kullanırsınız. Ayrıca özgür olmayan işletim 
sistemlerinde özgür uygulama programlarını ve araçlarını da 
çalıştırabilirsiniz; bu size tam özgürlüğün verilmesini sağlamaz 
ancak birçok kullanıcı bunu yapmaktadır."
 
 # type: Content of: <p>
-msgid ""
-"Treacherous computing puts the existence of free operating systems and free "
-"applications at risk, because you may not be able to run them at all.  Some "
-"versions of treacherous computing would require the operating system to be "
-"specifically authorized by a particular company.  Free operating systems "
-"could not be installed.  Some versions of treacherous computing would "
-"require every program to be specifically authorized by the operating system "
-"developer.  You could not run free applications on such a system.  If you "
-"did figure out how, and told someone, that could be a crime."
-msgstr ""
+msgid "Treacherous computing puts the existence of free operating systems and 
free applications at risk, because you may not be able to run them at all.  
Some versions of treacherous computing would require the operating system to be 
specifically authorized by a particular company.  Free operating systems could 
not be installed.  Some versions of treacherous computing would require every 
program to be specifically authorized by the operating system developer.  You 
could not run free applications on such a system.  If you did figure out how, 
and told someone, that could be a crime."
+msgstr "Güvenilmez işletim, özgür işletim sistemlerinin ve özgür 
uygulamalarının varlığını tehlikeye atmaktadır çünkü bunları 
çalıştırmanız mümkün olmayabilir. Güvenilmez işletimin bazı 
sürümleri, işletim sisteminin belirli bir firma tarafından özel olarak 
yetkilendirilmesini gerektirecektir. Özgür yazılım sistemleri böyle bir 
sisteme kurulamayabilir. güvenilmez işletimin bazı sürümleri, her 
programın, işletim sistemi geliştiricisi tarafından özel olarak 
yetkilendirilmesini gerektirecektir. Bu gibi bir sistem üzerinde özgür 
uygulamaları çalıştıramazsınız. Bunun nasıl olduğunu belirler ve 
birilerine anlatırsanız, bu bir suç olabilir."
 
 # type: Content of: <p>
-msgid ""
-"There are proposals already for US laws that would require all computers to "
-"support treacherous computing, and to prohibit connecting old computers to "
-"the Internet.  The CBDTPA (we call it the Consume But Don't Try Programming "
-"Act) is one of them.  But even if they don't legally force you to switch to "
-"treacherous computing, the pressure to accept it may be enormous.  Today "
-"people often use Word format for communication, although this causes several "
-"sorts of problems (see <a href=\"/philosophy/no-word-attachments.html"
-"\">&ldquo;We Can Put an End to Word Attachments&rdquo;</a>).  If only a "
-"treacherous-computing machine can read the latest Word documents, many "
-"people will switch to it, if they view the situation only in terms of "
-"individual action (take it or leave it).  To oppose treacherous computing, "
-"we must join together and confront the situation as a collective choice."
-msgstr ""
+msgid "There are proposals already for US laws that would require all 
computers to support treacherous computing, and to prohibit connecting old 
computers to the Internet.  The CBDTPA (we call it the Consume But Don't Try 
Programming Act) is one of them.  But even if they don't legally force you to 
switch to treacherous computing, the pressure to accept it may be enormous.  
Today people often use Word format for communication, although this causes 
several sorts of problems (see <a 
href=\"/philosophy/no-word-attachments.html\">&ldquo;We Can Put an End to Word 
Attachments&rdquo;</a>).  If only a treacherous-computing machine can read the 
latest Word documents, many people will switch to it, if they view the 
situation only in terms of individual action (take it or leave it).  To oppose 
treacherous computing, we must join together and confront the situation as a 
collective choice."
+msgstr "Tüm bilgisayarların güvenilmez işletimi desteklemesini ve eski 
bilgisayarların İnternete bağlanmasının önlenmesini isteyen öneriler 
halihazırda A.B.D. kanunlarının arasına sokulmak üzere önerilmektedir. 
CBDTPA (Tüket Ama Programlama Yapmaya Çalışma olarak adlandırmaktayız) 
bunlardan biridir. Ancak sizi yasal olarak güvenilmez işletime zorlayamasalar 
bile, güvenilmez işletimin kabul edilmesine ilişkin baskı korkunç 
seviyelerde olabilir. Çeşitli problemlere neden olmasına rağmen, bugün, 
insanlar haberleşmek için genellikle Word biçimini kullanmaktadır (<a 
href=\"/philosophy/no-word-attachments.html\">Word biçimi kullanımına son 
verebiliriz</a>). Yalnızca güvenilmez işletim ile en son Word belgeleri 
okunabiliyorsa, durumu yalnızca münferit hareket (al ya da alma) açısından 
görürlerse, birçok insan ona dönecektir. Güvenilmez işletime karşı 
koymak için, iş birliği yapmalı ve duruma toplu bir tercih olarak göğüs 
germeliyiz."
 
 # type: Content of: <p>
-msgid ""
-"For further information about treacherous computing, see <a href=\"http://";
-"www.cl.cam.ac.uk/users/rja14/tcpa-faq.html\">http://www.cl.cam.ac.uk/users/";
-"rja14/tcpa-faq.html</a>."
-msgstr ""
+msgid "For further information about treacherous computing, see <a 
href=\"http://www.cl.cam.ac.uk/users/rja14/tcpa-faq.html\";>http://www.cl.cam.ac.uk/users/rja14/tcpa-faq.html</a>."
+msgstr "Güvenilmez işletim hakkında daha fazla bilgi için, <a 
href=\"http://www.cl.cam.ac.uk/users/rja14/tcpa-faq.html\";>http://www.cl.cam.ac.uk/users/rja14/tcpa-faq.html</a>
 sayfasına bakınız."
 
 # type: Content of: <p>
-msgid ""
-"To block treacherous computing will require large numbers of citizens to "
-"organize.  We need your help! Please support <a href=\"http://";
-"DefectiveByDesign.org\">Defective by Design</a>, the FSF's campaign against "
-"Digital Restrictions Management."
-msgstr ""
+msgid "To block treacherous computing will require large numbers of citizens 
to organize.  We need your help! Please support <a 
href=\"http://DefectiveByDesign.org\";>Defective by Design</a>, the FSF's 
campaign against Digital Restrictions Management."
+msgstr "Güvenilmez işletimin engellenmesi, çok sayıda vatandaşın 
örgütlenmesini gerektirecektir. Yardımınıza ihtiyacımız var! Lütfen <a 
href=\"http://DefectiveByDesign.org\";>Tasarımda Hatalı</a>yı, FSF'nin 
Sayısal Kısıtlama Yönetime karşı kampanyasını destekleyin."
 
 # type: Content of: <h3>
 msgid "Postscripts"
 msgstr ""
 
 # type: Content of: <ol><li>
-msgid ""
-"The computer security field uses the term &ldquo;trusted computing&rdquo; in "
-"a different way&mdash;beware of confusion between the two meanings."
-msgstr ""
+msgid "The computer security field uses the term &ldquo;trusted 
computing&rdquo; in a different way&mdash;beware of confusion between the two 
meanings."
+msgstr "Bilgisayar güvenliği alanında  &ldquo;güvenli işletim&rdquo; 
başka bir anlamda kullanılmaktadır; lütfen iki anlam arasındaki farka 
dikkat edin."
 
 # type: Content of: <ol><li>
-msgid ""
-"The GNU Project distributes the GNU Privacy Guard, a program that implements "
-"public-key encryption and digital signatures, which you can use to send "
-"secure and private email.  It is useful to explore how GPG differs from "
-"treacherous computing, and see what makes one helpful and the other so "
-"dangerous."
-msgstr ""
+msgid "The GNU Project distributes the GNU Privacy Guard, a program that 
implements public-key encryption and digital signatures, which you can use to 
send secure and private email.  It is useful to explore how GPG differs from 
treacherous computing, and see what makes one helpful and the other so 
dangerous."
+msgstr "GNU Projesi, güvenli ve özel e-posta göndermek için 
kullanabileceğiniz açık anahtar şifreleme ve sayısal imzaları uygulayan 
bir program olan GNU Gizlilik Koruyucusunu [:GNU Privacy Guard] 
dağıtmaktadır. GPG’nin güvenli işletimden nasıl farklı olduğunun 
keşfedilmesi ve birini yardımcı, diğerini tehlikeli yapan şeyin ne 
olduğunun görülmesi yararlıdır."
 
 # type: Content of: <ol><li><p>
-msgid ""
-"When someone uses GPG to send you an encrypted document, and you use GPG to "
-"decode it, the result is an unencrypted document that you can read, forward, "
-"copy, and even re-encrypt to send it securely to someone else.  A "
-"treacherous-computing application would let you read the words on the "
-"screen, but would not let you produce an unencrypted document that you could "
-"use in other ways.  GPG, a free software package, makes security features "
-"available to the users; <em>they</em> use <em>it</em>.  Treacherous "
-"computing is designed to impose restrictions on the users; <em>it</em> uses "
-"<em>them</em>."
-msgstr ""
-
+msgid "When someone uses GPG to send you an encrypted document, and you use 
GPG to decode it, the result is an unencrypted document that you can read, 
forward, copy, and even re-encrypt to send it securely to someone else.  A 
treacherous-computing application would let you read the words on the screen, 
but would not let you produce an unencrypted document that you could use in 
other ways.  GPG, a free software package, makes security features available to 
the users; <em>they</em> use <em>it</em>.  Treacherous computing is designed to 
impose restrictions on the users; <em>it</em> uses <em>them</em>."
+msgstr "Biri size şifreli bir belgeyi yollamak için GPG’yi 
kullandığında ve siz, kodunu çözmek için GPG’yi kullandığınızda, 
sonuç, okuyabileceğiniz, başkalarına gönderebileceğiniz, 
kopyalayabileceğiniz ve hatta birilerine yine güvenli bir şekilde göndermek 
için yeniden şifreleyebileceğiniz şifreli olmayan bir belgedir. Güvenilmez 
bir bilgisayar çalışması uygulaması, ekrandaki sözcükleri okumanıza 
izin verir ancak başka şekillerde kullanabileceğiniz şifreli olmayan bir 
belge oluşturmanıza izin vermez. Özgür bir yazılım paketi olan GPG, 
güvenlik özelliklerinin kullanıcılar tarafından erişilebilir olmasını 
sağlar; <em>insanlar</em>, bu <em>özelliği</em> kullanır. Güvenilmez 
işletim ise, kullanıcılar üzerinde kısıtlamalar dayatmak için 
tasarlanmıştır; <em>güvenilmez işletim</em> <em>insanları</em> kullanır."
 # type: Content of: <ol><li>
-msgid ""
-"The supporters of treacherous computing focus their discourse on its <a name="
-"\"beneficial\">beneficial uses</a>.  What they say is often correct, just "
-"not important."
-msgstr ""
+msgid "The supporters of treacherous computing focus their discourse on its <a 
name=\"beneficial\">beneficial uses</a>.  What they say is often correct, just 
not important."
+msgstr "Güvensiz hesaplamanın destekçileri söylemlerinin odak noktasını 
<a name=\"beneficial\">yararlı kullanımlar</a> oluşturur. Söyledikleri 
genellikle doğrudur, sadece önemsizdir."
 
 # type: Content of: <ol><li><p>
-msgid ""
-"Like most hardware, treacherous-computing hardware can be used for purposes "
-"which are not harmful.  But these features can be implemented in other ways, "
-"without treacherous-computing hardware.  The principal difference that "
-"treacherous computing makes for users is the nasty consequence: rigging your "
-"computer to work against you."
-msgstr ""
+msgid "Like most hardware, treacherous-computing hardware can be used for 
purposes which are not harmful.  But these features can be implemented in other 
ways, without treacherous-computing hardware.  The principal difference that 
treacherous computing makes for users is the nasty consequence: rigging your 
computer to work against you."
+msgstr "Çoğu donanım gibi, güvensiz-hesaplama donanımı da zararlı 
olmayan amaçlarla kullanılabilir. Ancak bu özellikler başka şekillerde de 
gerçekleştirilebilir, güvensiz-hesaplama donanımı olmadan da. Teme 
farklılık, güvensiz hesaplama kullanıcıların şu kötü durumla 
karşılaşmalarına neden olur: bilgisayarınız size karşı çalışmak 
üzere donatılır"
 
 # type: Content of: <ol><li><p>
-msgid ""
-"What they say is true, and what I say is true.  Put them together and what "
-"do you get? Treacherous computing is a plan to take away our freedom, while "
-"offering minor benefits to distract us from what we would lose."
-msgstr ""
+msgid "What they say is true, and what I say is true.  Put them together and 
what do you get? Treacherous computing is a plan to take away our freedom, 
while offering minor benefits to distract us from what we would lose."
+msgstr "Ne diyorlarsa doğrudur, ben ne diyorsam da doğrudur. Bu ikisini 
birlikte düşünün, ne elde ediyorsunuz? Güvensiz hesaplama 
özgürlüğünüzü elinizden almak için bir plandır, ne kaybedeceğimizi 
görmemizi engellemek için ufak yararlar sunmaktadır."
 
 # type: Content of: <ol><li>
-msgid ""
-"Microsoft presents Palladium as a security measure, and claims that it will "
-"protect against viruses, but this claim is evidently false.  A presentation "
-"by Microsoft Research in October 2002 stated that one of the specifications "
-"of Palladium is that existing operating systems and applications will "
-"continue to run; therefore, viruses will continue to be able to do all the "
-"things that they can do today."
+msgid "Microsoft presents Palladium as a security measure, and claims that it 
will protect against viruses, but this claim is evidently false.  A 
presentation by Microsoft Research in October 2002 stated that one of the 
specifications of Palladium is that existing operating systems and applications 
will continue to run; therefore, viruses will continue to be able to do all the 
things that they can do today."
 msgstr ""
 
 # type: Content of: <ol><li><p>
-msgid ""
-"When Microsoft employees speak of &ldquo;security&rdquo; in connection with "
-"Palladium, they do not mean what we normally mean by that word: protecting "
-"your machine from things you do not want.  They mean protecting your copies "
-"of data on your machine from access by you in ways others do not want.  A "
-"slide in the presentation listed several types of secrets Palladium could be "
-"used to keep, including &ldquo;third party secrets&rdquo; and &ldquo;user "
-"secrets&rdquo;&mdash;but it put &ldquo;user secrets&rdquo; in quotation "
-"marks, recognizing that this somewhat of an absurdity in the context of "
-"Palladium."
+msgid "When Microsoft employees speak of &ldquo;security&rdquo; in connection 
with Palladium, they do not mean what we normally mean by that word: protecting 
your machine from things you do not want.  They mean protecting your copies of 
data on your machine from access by you in ways others do not want.  A slide in 
the presentation listed several types of secrets Palladium could be used to 
keep, including &ldquo;third party secrets&rdquo; and &ldquo;user 
secrets&rdquo;&mdash;but it put &ldquo;user secrets&rdquo; in quotation marks, 
recognizing that this somewhat of an absurdity in the context of Palladium."
 msgstr ""
 
 # type: Content of: <ol><li><p>
-msgid ""
-"The presentation made frequent use of other terms that we frequently "
-"associate with the context of security, such as &ldquo;attack&rdquo;, &ldquo;"
-"malicious code&rdquo;, &ldquo;spoofing&rdquo;, as well as &ldquo;"
-"trusted&rdquo;.  None of them means what it normally means.  &ldquo;"
-"Attack&rdquo; doesn't mean someone trying to hurt you, it means you trying "
-"to copy music.  &ldquo;Malicious code&rdquo; means code installed by you to "
-"do what someone else doesn't want your machine to do.  &ldquo;"
-"Spoofing&rdquo; doesn't mean someone's fooling you, it means your fooling "
-"Palladium.  And so on."
+msgid "The presentation made frequent use of other terms that we frequently 
associate with the context of security, such as &ldquo;attack&rdquo;, 
&ldquo;malicious code&rdquo;, &ldquo;spoofing&rdquo;, as well as 
&ldquo;trusted&rdquo;.  None of them means what it normally means.  
&ldquo;Attack&rdquo; doesn't mean someone trying to hurt you, it means you 
trying to copy music.  &ldquo;Malicious code&rdquo; means code installed by you 
to do what someone else doesn't want your machine to do.  
&ldquo;Spoofing&rdquo; doesn't mean someone's fooling you, it means your 
fooling Palladium.  And so on."
 msgstr ""
 
 # type: Content of: <ol><li>
-msgid ""
-"A previous statement by the Palladium developers stated the basic premise "
-"that whoever developed or collected information should have total control of "
-"how you use it.  This would represent a revolutionary overturn of past ideas "
-"of ethics and of the legal system, and create an unprecedented system of "
-"control.  The specific problems of these systems are no accident; they "
-"result from the basic goal.  It is the goal we must reject."
+msgid "A previous statement by the Palladium developers stated the basic 
premise that whoever developed or collected information should have total 
control of how you use it.  This would represent a revolutionary overturn of 
past ideas of ethics and of the legal system, and create an unprecedented 
system of control.  The specific problems of these systems are no accident; 
they result from the basic goal.  It is the goal we must reject."
 msgstr ""
 
 # type: Content of: <h4>
-msgid ""
-"This essay is published in <a href=\"http://shop.fsf.org/product/free-";
-"software-free-society/\"><cite>Free Software, Free Society: The Selected "
-"Essays of Richard M. Stallman</cite></a>"
-msgstr ""
+msgid "This essay is published in <a 
href=\"http://shop.fsf.org/product/free-software-free-society/\";><cite>Free 
Software, Free Society: The Selected Essays of Richard M. Stallman</cite></a>"
+msgstr "Bu yazı <a 
href=\"http://shop.fsf.org/product/free-software-free-society/\";><cite>Özgür 
Yazılım, Özgür Toplum: Richard M. Stallman'ın Seçilmiş Yazıları</cite> 
kitabında yayınlanmıştır</a>"
 
 # type: Content of: <div>
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
@@ -324,42 +145,32 @@
 msgstr ""
 
 # type: Content of: <div><p>
-msgid ""
-"Please send FSF &amp; GNU inquiries to <a href=\"mailto:address@hidden";>&lt;"
-"address@hidden&gt;</a>.  There are also <a href=\"/contact/\">other ways to "
-"contact</a> the FSF.  <br /> Please send broken links and other corrections "
-"or suggestions to <a href=\"mailto:address@hidden";>&lt;address@hidden"
-"org&gt;</a>."
-msgstr ""
+msgid "Please send FSF &amp; GNU inquiries to <a 
href=\"mailto:address@hidden";>&lt;address@hidden&gt;</a>.  There are also <a 
href=\"/contact/\">other ways to contact</a> the FSF.  <br /> Please send 
broken links and other corrections or suggestions to <a 
href=\"mailto:address@hidden";>&lt;address@hidden&gt;</a>."
+msgstr "Lütfen FSF ve GNU ile ilgili sorularınızı <a 
href=\"mailto:address@hidden";>&lt;address@hidden&gt;</a> adresine iletin. FSF 
ile iletişim kurmanın <a href=\"/contact/\">başka yolları</a> da vardır. 
Lütfen çalışmayan bağlantıları ve başka düzeltmeleri veya 
önerilerinizi <a href=\"mailto:address@hidden";>&lt;address@hidden&gt;</a> 
adresine gönderin."
 
 # type: Content of: <div><p>
-msgid ""
-"Please see the <a href=\"/server/standards/README.translations.html"
-"\">Translations README</a> for information on coordinating and submitting "
-"translations of this article."
-msgstr ""
+msgid "Please see the <a 
href=\"/server/standards/README.translations.html\">Translations README</a> for 
information on coordinating and submitting translations of this article."
+msgstr "Bu makale için çeviri göndermek veya çevirileri düzenlemek için 
lütfen <a href=\"/server/standards/README.translations.html\">çeviriler 
hakkındaki BENİOKU</a> dosyasına bakınız."
 
 # type: Content of: <div><p>
 msgid "Copyright &copy; 2002, 2007 Richard Stallman"
-msgstr ""
+msgstr "Copyright &copy; 2002, 2007 Richard Stallman"
 
 # type: Content of: <div><p>
-msgid ""
-"Verbatim copying and distribution of this entire article are permitted "
-"worldwide, without royalty, in any medium, provided this notice, and the "
-"copyright notice, are preserved."
-msgstr ""
+msgid "Verbatim copying and distribution of this entire article are permitted 
worldwide, without royalty, in any medium, provided this notice, and the 
copyright notice, are preserved."
+msgstr "Bu makalenin kelimesi kelimesine kopyalanmasına ve dağıtılmasına 
bu uyarının belirtilmesi durumunda izin verilmektedir."
 
 # type: Content of: <div><div>
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't want credits.
 msgid "*GNUN-SLOT: TRANSLATOR'S CREDITS*"
-msgstr ""
+msgstr "Çiğdem Özşar, Birkan Sarıfakıoğlu, Tahir Emre Kalaycı, İzlem 
Gözükeleş, Serkan Çapkan"
 
 # type: Content of: <div><p>
 #.  timestamp start 
 msgid "Updated:"
-msgstr ""
+msgstr "17 Aralık 2009"
 
 # type: Content of: <div><h4>
 msgid "Translations of this page"
 msgstr ""
+




reply via email to

[Prev in Thread] Current Thread [Next in Thread]