Author: buildbot
Date: Thu Aug  1 17:20:04 2013
New Revision: 872331

Log:
Staging update by buildbot for ooo-site

Modified:
    websites/staging/ooo-site/trunk/cgi-bin/   (props changed)
    websites/staging/ooo-site/trunk/content/   (props changed)
    
websites/staging/ooo-site/trunk/content/it/stampa/comunicati/CVE-2012-0037.html

Propchange: websites/staging/ooo-site/trunk/cgi-bin/
------------------------------------------------------------------------------
--- cms:source-revision (original)
+++ cms:source-revision Thu Aug  1 17:20:04 2013
@@ -1 +1 @@
-1509335
+1509336

Propchange: websites/staging/ooo-site/trunk/content/
------------------------------------------------------------------------------
--- cms:source-revision (original)
+++ cms:source-revision Thu Aug  1 17:20:04 2013
@@ -1 +1 @@
-1509335
+1509336

Modified: 
websites/staging/ooo-site/trunk/content/it/stampa/comunicati/CVE-2012-0037.html
==============================================================================
--- 
websites/staging/ooo-site/trunk/content/it/stampa/comunicati/CVE-2012-0037.html 
(original)
+++ 
websites/staging/ooo-site/trunk/content/it/stampa/comunicati/CVE-2012-0037.html 
Thu Aug  1 17:20:04 2013
@@ -58,13 +58,13 @@ seguire le istruzioni indicate nel file 
 sua <a href="CVE-2012-0037.pdf">traduzione italiana</a>.</p>
 
         <ul>
-            <li><a 
href="http://www.apache.org/dyn/closer.cgi/incubator/ooo/3.3/patches/cve-2012-0037/CVE-2012-0037-win.zip";>Per
 piattaforma Windows </a> 
-(<a 
href="http://www.apache.org/dist/incubator/ooo/3.3/patches/cve-2012-0037/CVE-2012-0037-win.zip.md5";>MD5</a>)
 
-(<a 
href="http://www.apache.org/dist/incubator/ooo/3.3/patches/cve-2012-0037/CVE-2012-0037-win.zip.sha1";>SHA1</a>)</li>
-
-            <li><a 
href="http://www.apache.org/dyn/closer.cgi/incubator/ooo/3.3/patches/cve-2012-0037/CVE-2012-0037-mac.zip";>Per
 piattaforma  MacOS</a> 
-(<a 
href="http://www.apache.org/dist/incubator/ooo/3.3/patches/cve-2012-0037/CVE-2012-0037-mac.zip.md5";>MD5</a>)
 
-(<a 
href="http://www.apache.org/dist/incubator/ooo/3.3/patches/cve-2012-0037/CVE-2012-0037-mac.zip.sha1";>SHA1</a>)</li>
+            <li><a 
href="http://archive.apache.org/dist/incubator/ooo/3.3/patches/cve-2012-0037/CVE-2012-0037-win.zip";>Per
 piattaforma Windows </a> 
+(<a 
href="http://archive.apache.org/dist/incubator/ooo/3.3/patches/cve-2012-0037/CVE-2012-0037-win.zip.md5";>MD5</a>)
 
+(<a 
href="http://archive.apache.org/dist/incubator/ooo/3.3/patches/cve-2012-0037/CVE-2012-0037-win.zip.sha1";>SHA1</a>)</li>
+
+            <li><a 
href="http://archive.apache.org/dist/incubator/ooo/3.3/patches/cve-2012-0037/CVE-2012-0037-mac.zip";>Per
 piattaforma  MacOS</a> 
+(<a 
href="http://archive.apache.org/dist/incubator/ooo/3.3/patches/cve-2012-0037/CVE-2012-0037-mac.zip.md5";>MD5</a>)
 
+(<a 
href="http://archive.apache.org/dist/incubator/ooo/3.3/patches/cve-2012-0037/CVE-2012-0037-mac.zip.sha1";>SHA1</a>)</li>
             <li>Per Linux e altre piattaforme, consultare il proprio 
distributore o venditore di sistema operativo per istruzioni circa la 
patch.</li>
         </ul>
 
@@ -78,7 +78,7 @@ Forniamo gli hash MD5 e SHA1 di queste p
 <p>
 Gli hash MD5 e SHA1 possono essere verificati utilizzando gli strumenti di 
Unix (sha1, sha1sum o md5sum).</p>
 <p>
-Le firme PGP possono venir verificate utilizzanto  PGP or GPG. Come primo 
passo scaricate i files <a 
href="http://www.apache.org/dist/incubator/ooo/KEYS";>KEYS</a>, unitamente alla 
file di firma asc per la patch qui sopra. Sinceratevi di scaricare dalla 
directory di distribuzione principale e non da un mirror. Quindi, eseguite la 
verifica come segue:</p><p>
+Le firme PGP possono venir verificate utilizzando  PGP or GPG. Come primo 
passo scaricate i files <a 
href="http://www.apache.org/dist/openoffice/KEYS";>KEYS</a>, unitamente alla 
file di firma asc per la patch qui sopra. Sinceratevi di scaricare dalla 
directory di distribuzione principale e non da un mirror. Quindi, eseguite la 
verifica come segue:</p><p>
 <code>
 % pgpk -a KEYS <br>
 % pgpv CVE-2012-0037-{win|mac}.zip.asc <br>


Reply via email to