Switch from captioned to figure
Some checks failed
the build failed

This commit is contained in:
Reinhard Müller 2019-04-27 17:15:17 +02:00
parent 7a5c157dfc
commit 1e39679549
5 changed files with 137 additions and 134 deletions

View File

@ -24,12 +24,12 @@
ανοίγει τρύπες ασφαλείας που χρησιμεύουν σε άλλους για επιθέσεις σε
υπολογιστές.</p>
<div class="captioned right" style="max-width: 650px; width: 40%">
<a href="http://static.fsf.org/nosvn/dbd/2012/day-against-drm/image2.png">
<img src="/news/2015/graphics/hi-res-in-chains.png" alt="hi res version"/></a>
<footer><a href="#restrictions-pictures">Δείτε παρακάτω για άλλες σχετικές
εικόνες</a></footer>
</div>
<figure class="float-right">
<a href="http://static.fsf.org/nosvn/dbd/2012/day-against-drm/image2.png"><img src="/news/2015/graphics/hi-res-in-chains.png" alt="hi res version"/></a>
<figcaption>
<a href="#restrictions-pictures">Δείτε παρακάτω για άλλες σχετικές εικόνες</a>
</figcaption>
</figure>
<p>Αυτό συνέβη πριν 10 χρόνια αν είχατε αγοράσει ένα από τα 25 εκατομμύρια
μουσικά CD της Sony. Αυτή η επίθεση από τη Sony στους υπολογιστές μας
@ -191,35 +191,35 @@ rootkit είχε συνδεθεί με τον ιδιοκτησιακό αναπ
<h2 id="restrictions-pictures">Σχετικές εικόνες</h2>
<div class="captioned left" style="width: 40%">
<a href="http://static.fsf.org/nosvn/dbd/2012/day-against-drm/image2.png">
<img src="/news/2015/graphics/hi-res-in-chains.png" alt="hi-res in-chains"/></a>
<footer><a href="http://creativecommons.org/licenses/by-sa/3.0/">CC BY SA 3.0</a> by Brendan Mruk and Matt Lee
<p><a href="http://static.fsf.org/nosvn/dbd/2012/day-against-drm/image2.png">Hi-res</a>
<a href="http://static.fsf.org/nosvn/dbd/2012/day-against-drm/in-chains.png">Low-res</a></p></footer>
</div>
<figure>
<a href="http://static.fsf.org/nosvn/dbd/2012/day-against-drm/image2.png"><img src="/news/2015/graphics/hi-res-in-chains.png" alt="hi-res in-chains"/></a>
<figcaption>
<a href="http://creativecommons.org/licenses/by-sa/3.0/">CC BY SA 3.0</a> by Brendan Mruk and Matt Lee.
<a href="http://static.fsf.org/nosvn/dbd/2012/day-against-drm/image2.png">Hi-res</a>
<a href="http://static.fsf.org/nosvn/dbd/2012/day-against-drm/in-chains.png">Low-res</a>
</figcaption>
</figure>
<div class="captioned right" style="width: 40%">
<a href="http://www.geograph.org.uk/photo/3478665">
<img src="/news/2015/graphics/Locked-library.jpg" alt="locked library"/></a>
<footer><a href="http://creativecommons.org/licenses/by-sa/2.0/">CC BY-SA 2.0</a> by Chris Downer</footer>
</div>
<figure>
<a href="http://www.geograph.org.uk/photo/3478665"><img src="/news/2015/graphics/Locked-library.jpg" alt="locked library"/></a>
<figcaption>
<a href="http://creativecommons.org/licenses/by-sa/2.0/">CC BY-SA 2.0</a> by Chris Downer
</figcaption>
</figure>
<div class="captioned right" style="width: 40%">
<a href="https://pixabay.com/en/privacy-policy-data-security-445156/">
<img src="/news/2015/graphics/Locked-CD.jpg" alt="locked cd"/></a>
<footer><a href="https://creativecommons.org/publicdomain/zero/1.0/">CC0 1.0 Public Domain</a></footer>
</div>
<div class="captioned left" style="width: 40%">
<a href="https://pixabay.com/en/keyboard-sure-privacy-policy-castle-628703/">
<img src="/news/2015/graphics/Locked-keyboard.jpg" alt="locked keyboard"/></a>
<footer><a href="https://creativecommons.org/publicdomain/zero/1.0/">CC0 1.0 Public Domain</a></footer>
</div>
<figure>
<a href="https://pixabay.com/en/privacy-policy-data-security-445156/"><img src="/news/2015/graphics/Locked-CD.jpg" alt="locked cd"/></a>
<figcaption>
<a href="https://creativecommons.org/publicdomain/zero/1.0/">CC0 1.0 Public Domain</a>
</figcaption>
</figure>
<figure>
<a href="https://pixabay.com/en/keyboard-sure-privacy-policy-castle-628703/"><img src="/news/2015/graphics/Locked-keyboard.jpg" alt="locked keyboard"/></a>
<figcaption>
<a href="https://creativecommons.org/publicdomain/zero/1.0/">CC0 1.0 Public Domain</a>
</figcaption>
</figure>
</div>
</body>

View File

@ -22,11 +22,12 @@ program secretly checks whether that person started a program to copy CDs, and i
forces them to stop. It also slows down their computer and opens security holes
which can be used by others to attack their own computer.</p>
<div class="captioned right" style="max-width: 650px; width: 40%">
<a href="http://static.fsf.org/nosvn/dbd/2012/day-against-drm/image2.png">
<img src="/news/2015/graphics/hi-res-in-chains.png" alt="hi res version"/></a>
<footer><a href="#restrictions-pictures">See below for more restrictions pictures</a></footer>
</div>
<figure class="float-right">
<a href="http://static.fsf.org/nosvn/dbd/2012/day-against-drm/image2.png"><img src="/news/2015/graphics/hi-res-in-chains.png" alt="hi res version"/></a>
<figcaption>
<a href="#restrictions-pictures">See below for more restrictions pictures</a>
</figcaption>
</figure>
<p>That is what happened 10 years ago if you bought one of 25 million music CDs
from Sony. This attack by Sony on people's computers was discovered on 31
@ -160,35 +161,35 @@ exceptions and limitations.</strong></li>
<h2 id="restrictions-pictures">Related pictures</h2>
<div class="captioned left" style="width: 40%">
<a href="http://static.fsf.org/nosvn/dbd/2012/day-against-drm/image2.png">
<img src="/news/2015/graphics/hi-res-in-chains.png" alt="hi-res in-chains"/></a>
<footer><a href="http://creativecommons.org/licenses/by-sa/3.0/">CC BY SA 3.0</a> by Brendan Mruk and Matt Lee
<p><a href="http://static.fsf.org/nosvn/dbd/2012/day-against-drm/image2.png">Hi-res</a>
<a href="http://static.fsf.org/nosvn/dbd/2012/day-against-drm/in-chains.png">Low-res</a></p></footer>
</div>
<figure>
<a href="http://static.fsf.org/nosvn/dbd/2012/day-against-drm/image2.png"><img src="/news/2015/graphics/hi-res-in-chains.png" alt="hi-res in-chains"/></a>
<figcaption>
<a href="http://creativecommons.org/licenses/by-sa/3.0/">CC BY SA 3.0</a> by Brendan Mruk and Matt Lee.
<a href="http://static.fsf.org/nosvn/dbd/2012/day-against-drm/image2.png">Hi-res</a>
<a href="http://static.fsf.org/nosvn/dbd/2012/day-against-drm/in-chains.png">Low-res</a>
</figcaption>
</figure>
<div class="captioned right" style="width: 40%">
<a href="http://www.geograph.org.uk/photo/3478665">
<img src="/news/2015/graphics/Locked-library.jpg" alt="locked library"/></a>
<footer><a href="http://creativecommons.org/licenses/by-sa/2.0/">CC BY-SA 2.0</a> by Chris Downer</footer>
</div>
<figure>
<a href="http://www.geograph.org.uk/photo/3478665"><img src="/news/2015/graphics/Locked-library.jpg" alt="locked library"/></a>
<figcaption>
<a href="http://creativecommons.org/licenses/by-sa/2.0/">CC BY-SA 2.0</a> by Chris Downer
</figcaption>
</figure>
<div class="captioned right" style="width: 40%">
<a href="https://pixabay.com/en/privacy-policy-data-security-445156/">
<img src="/news/2015/graphics/Locked-CD.jpg" alt="locked cd"/></a>
<footer><a href="https://creativecommons.org/publicdomain/zero/1.0/">CC0 1.0 Public Domain</a></footer>
</div>
<div class="captioned left" style="width: 40%">
<a href="https://pixabay.com/en/keyboard-sure-privacy-policy-castle-628703/">
<img src="/news/2015/graphics/Locked-keyboard.jpg" alt="locked keyboard"/></a>
<footer><a href="https://creativecommons.org/publicdomain/zero/1.0/">CC0 1.0 Public Domain</a></footer>
</div>
<figure>
<a href="https://pixabay.com/en/privacy-policy-data-security-445156/"><img src="/news/2015/graphics/Locked-CD.jpg" alt="locked cd"/></a>
<figcaption>
<a href="https://creativecommons.org/publicdomain/zero/1.0/">CC0 1.0 Public Domain</a>
</figcaption>
</figure>
<figure>
<a href="https://pixabay.com/en/keyboard-sure-privacy-policy-castle-628703/"><img src="/news/2015/graphics/Locked-keyboard.jpg" alt="locked keyboard"/></a>
<figcaption>
<a href="https://creativecommons.org/publicdomain/zero/1.0/">CC0 1.0 Public Domain</a>
</figcaption>
</figure>
</div>
</body>

View File

@ -23,11 +23,12 @@ Si es así, le obliga a parar.
También ralentiza el ordenador y abre puertas secretas
que permiten atacar al PC.</p>
<div class="captioned right" style="max-width: 650px; width: 40%">
<a href="http://static.fsf.org/nosvn/dbd/2012/day-against-drm/image2.png">
<img src="/news/2015/graphics/hi-res-in-chains.png" alt="hi res version"/></a>
<footer><a href="#restrictions-pictures">Vaya al final para ver más imágenes de restricciones</a></footer>
</div>
<figure class="float-right">
<a href="http://static.fsf.org/nosvn/dbd/2012/day-against-drm/image2.png"><img src="/news/2015/graphics/hi-res-in-chains.png" alt="hi res version"/></a>
<figcaption>
<a href="#restrictions-pictures">Vaya al final para ver más imágenes de restricciones</a>
</figcaption>
</figure>
<p>Esto es lo que pasó hace 10 años si compró uno de los 25 millones de CDs de música de Sony. Este ataque de Sony a los ordenadores personales se descubrió el 31 de
octubre del 2005 y posteriormente fue conocido como el "Sony rootkit". Afectó a más
@ -162,35 +163,35 @@ a la Comisión que proponga una legislación que asegure que los consumidores pu
<h2 id="restrictions-pictures">Imágenes relacionados</h2>
<div class="captioned left" style="width: 40%">
<a href="http://static.fsf.org/nosvn/dbd/2012/day-against-drm/image2.png">
<img src="/news/2015/graphics/hi-res-in-chains.png" alt="hi-res in-chains"/></a>
<footer><a href="http://creativecommons.org/licenses/by-sa/3.0/deed.es_ES">CC BY SA 3.0</a> por Brendan Mruk y Matt Lee
<p><a href="http://static.fsf.org/nosvn/dbd/2012/day-against-drm/image2.png">Alta resolución</a>
<a href="http://static.fsf.org/nosvn/dbd/2012/day-against-drm/in-chains.png">Baja resolución</a></p></footer>
</div>
<figure>
<a href="http://static.fsf.org/nosvn/dbd/2012/day-against-drm/image2.png"><img src="/news/2015/graphics/hi-res-in-chains.png" alt="hi-res in-chains"/></a>
<figcaption>
<a href="http://creativecommons.org/licenses/by-sa/3.0/deed.es_ES">CC BY SA 3.0</a> por Brendan Mruk y Matt Lee.
<a href="http://static.fsf.org/nosvn/dbd/2012/day-against-drm/image2.png">Alta resolución</a>
<a href="http://static.fsf.org/nosvn/dbd/2012/day-against-drm/in-chains.png">Baja resolución</a>
</figcaption>
</figure>
<div class="captioned right" style="width: 40%">
<a href="http://www.geograph.org.uk/photo/3478665">
<img src="/news/2015/graphics/Locked-library.jpg" alt="locked library"/></a>
<footer><a href="http://creativecommons.org/licenses/by-sa/2.0/deed.es">CC BY-SA 2.0</a> por Chris Downer</footer>
</div>
<figure>
<a href="http://www.geograph.org.uk/photo/3478665"><img src="/news/2015/graphics/Locked-library.jpg" alt="locked library"/></a>
<figcaption>
<a href="http://creativecommons.org/licenses/by-sa/2.0/deed.es">CC BY-SA 2.0</a> por Chris Downer
</figcaption>
</figure>
<div class="captioned right" style="width: 40%">
<a href="https://pixabay.com/en/privacy-policy-data-security-445156/">
<img src="/news/2015/graphics/Locked-CD.jpg" alt="locked cd"/></a>
<footer><a href="https://creativecommons.org/publicdomain/zero/1.0/deed.es">CC0 1.0 Public Domain</a></footer>
<figure>
<a href="https://pixabay.com/en/privacy-policy-data-security-445156/"><img src="/news/2015/graphics/Locked-CD.jpg" alt="locked cd"/></a>
<figcaption>
<a href="https://creativecommons.org/publicdomain/zero/1.0/deed.es">CC0 1.0 Public Domain</a>
</figcaption>
</figure>
</div>
<div class="captioned left" style="width: 40%">
<a href="https://pixabay.com/en/keyboard-sure-privacy-policy-castle-628703/">
<img src="/news/2015/graphics/Locked-keyboard.jpg" alt="locked keyboard"/></a>
<footer><a href="https://creativecommons.org/publicdomain/zero/1.0/deed.es_ES">CC0 1.0 Public Domain</a></footer>
</div>
<figure>
<a href="https://pixabay.com/en/keyboard-sure-privacy-policy-castle-628703/"><img src="/news/2015/graphics/Locked-keyboard.jpg" alt="locked keyboard"/></a>
<figcaption>
<a href="https://creativecommons.org/publicdomain/zero/1.0/deed.es_ES">CC0 1.0 Public Domain</a>
</figcaption>
</figure>
</div>
</body>

View File

@ -22,11 +22,12 @@ er een programma geïnstalleerd. Dit programma controleert in het geheim of er e
wordt het gestopt. Het vertraagt ook hun computer en opent beveiligingslekken die door anderen kunnen
worden gebruikt om hun eigen computer aan te vallen.</p>
<div class="captioned right" style="max-width: 650px; width: 40%">
<a href="http://static.fsf.org/nosvn/dbd/2012/day-against-drm/image2.png">
<img src="/news/2015/graphics/hi-res-in-chains.png" alt="hi res versie"/></a>
<footer><a href="#restrictions-pictures">Zie hieronder voor meer afbeeldingen over beperkingen</a></footer>
</div>
<figure class="float-right">
<a href="http://static.fsf.org/nosvn/dbd/2012/day-against-drm/image2.png"><img src="/news/2015/graphics/hi-res-in-chains.png" alt="hi res versie"/></a>
<figcaption>
<a href="#restrictions-pictures">Zie hieronder voor meer afbeeldingen over beperkingen</a>
</figcaption>
</figure>
<p>Dit is wat tien jaar geleden gebeurde als je één van de 25 miljoen muziek-cd's van
Sony had gekocht. Deze aanval van Sony op de computers van mensen is op 31 oktober 2005 ontdekt
@ -162,35 +163,35 @@ auteursrecht.</strong></li>
<h2 id="restrictions-pictures">Verwante afbeeldingen</h2>
<div class="captioned left" style="width: 40%">
<a href="http://static.fsf.org/nosvn/dbd/2012/day-against-drm/image2.png">
<img src="/news/2015/graphics/hi-res-in-chains.png" alt="laptop, cd en tablet aan de ketting"/></a>
<footer><a href="http://creativecommons.org/licenses/by-sa/3.0/">CC BY SA 3.0</a> door Brendan Mruk en Matt Lee
<p><a href="http://static.fsf.org/nosvn/dbd/2012/day-against-drm/image2.png">Hoge resolutie</a>
<a href="http://static.fsf.org/nosvn/dbd/2012/day-against-drm/in-chains.png">Lage resolutie</a></p></footer>
</div>
<figure>
<a href="http://static.fsf.org/nosvn/dbd/2012/day-against-drm/image2.png"><img src="/news/2015/graphics/hi-res-in-chains.png" alt="laptop, cd en tablet aan de ketting"/></a>
<figcaption>
<a href="http://creativecommons.org/licenses/by-sa/3.0/">CC BY SA 3.0</a> door Brendan Mruk en Matt Lee.
<a href="http://static.fsf.org/nosvn/dbd/2012/day-against-drm/image2.png">Hoge resolutie</a>
<a href="http://static.fsf.org/nosvn/dbd/2012/day-against-drm/in-chains.png">Lage resolutie</a>
</figcaption>
</figure>
<div class="captioned right" style="width: 40%">
<a href="http://www.geograph.org.uk/photo/3478665">
<img src="/news/2015/graphics/Locked-library.jpg" alt="bibliotheekboeken aan de ketting"/></a>
<footer><a href="http://creativecommons.org/licenses/by-sa/2.0/">CC BY-SA 2.0</a> door Chris Downer</footer>
</div>
<figure>
<a href="http://www.geograph.org.uk/photo/3478665"><img src="/news/2015/graphics/Locked-library.jpg" alt="bibliotheekboeken aan de ketting"/></a>
<figcaption>
<a href="http://creativecommons.org/licenses/by-sa/2.0/">CC BY-SA 2.0</a> door Chris Downer
</figcaption>
</figure>
<div class="captioned right" style="width: 40%">
<a href="https://pixabay.com/en/privacy-policy-data-security-445156/">
<img src="/news/2015/graphics/Locked-CD.jpg" alt="cd met een slot erop"/></a>
<footer><a href="https://creativecommons.org/publicdomain/zero/1.0/">CC0 1.0 Publiek Domein</a></footer>
</div>
<div class="captioned left" style="width: 40%">
<a href="https://pixabay.com/en/keyboard-sure-privacy-policy-castle-628703/">
<img src="/news/2015/graphics/Locked-keyboard.jpg" alt="toetsenbord aan de ketting"/></a>
<footer><a href="https://creativecommons.org/publicdomain/zero/1.0/">CC0 1.0 Publiek Domein</a></footer>
</div>
<figure>
<a href="https://pixabay.com/en/privacy-policy-data-security-445156/"><img src="/news/2015/graphics/Locked-CD.jpg" alt="cd met een slot erop"/></a>
<figcaption>
<a href="https://creativecommons.org/publicdomain/zero/1.0/">CC0 1.0 Publiek Domein</a>
</figcaption>
</figure>
<figure>
<a href="https://pixabay.com/en/keyboard-sure-privacy-policy-castle-628703/"><img src="/news/2015/graphics/Locked-keyboard.jpg" alt="toetsenbord aan de ketting"/></a>
<figcaption>
<a href="https://creativecommons.org/publicdomain/zero/1.0/">CC0 1.0 Publiek Domein</a>
</figcaption>
</figure>
</div>
</body>

View File

@ -16,12 +16,12 @@
you use? With the "no cloud" graphics, we ask: who controls the technology that
controls your data? Who, ultimately, controls your data?</p>
<div class="captioned right" style="max-width: 600px; width: 35%;">
<a href="/contribute/spreadtheword.html"><img src="/contribute/promopics/thereisnocloud-bw-preview.png" alt="A cloud consisting of lots of small computers" width="100%" /></a>
<footer>
<p>Our "there is no cloud sticker"</p>
</footer>
</div>
<figure class="float-right">
<a href="/contribute/spreadtheword.html"><img src="/contribute/promopics/thereisnocloud-bw-preview.png" alt="A cloud consisting of lots of small computers" width="100%" /></a>
<figcaption>
Our "there is no cloud sticker"
</figcaption>
</figcaption>
<p>Please join our <a href="/contact/community.html">mailing lists</a> to
discuss this topic with us. If you want other people to start thinking about