[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[tor-commits] [translation/https_everywhere] Update translations for https_everywhere



commit 0d0db41a158928313653baa0934eb7a6d27b2cf8
Author: Translation commit bot <translation@xxxxxxxxxxxxxx>
Date:   Tue Aug 16 12:15:23 2016 +0000

    Update translations for https_everywhere
---
 es_AR/https-everywhere.dtd | 2 +-
 es_AR/ssl-observatory.dtd  | 2 +-
 2 files changed, 2 insertions(+), 2 deletions(-)

diff --git a/es_AR/https-everywhere.dtd b/es_AR/https-everywhere.dtd
index 4e48c67..c12a798 100644
--- a/es_AR/https-everywhere.dtd
+++ b/es_AR/https-everywhere.dtd
@@ -5,7 +5,7 @@
 <!ENTITY https-everywhere.about.created_by "Creado por">
 <!ENTITY https-everywhere.about.and ", y">
 <!ENTITY https-everywhere.about.librarians "Librería de conjunto de reglas">
-<!ENTITY https-everywhere.about.add_new_rule "Add New Rule">
+<!ENTITY https-everywhere.about.add_new_rule "Agregar Nueva Regla">
 <!ENTITY https-everywhere.about.thanks "Gracias a">
 <!ENTITY https-everywhere.about.many_contributors "Muchisimos contribuyentes, incluyendo">
 <!ENTITY https-everywhere.about.noscript "También, partes de HTTPS Everywhere están basadas en el codigo de NoScript, de Giorgio Maone y otras. ¡Agradecemos su excelente trabajo!">
diff --git a/es_AR/ssl-observatory.dtd b/es_AR/ssl-observatory.dtd
index 809d0e0..305afcc 100644
--- a/es_AR/ssl-observatory.dtd
+++ b/es_AR/ssl-observatory.dtd
@@ -27,7 +27,7 @@ se encuentre en una red corporativa muy invasiva:">
 "Seguro, a menos que utilice una red corporativa con nombres secretos de servidor de intranet:">
 
 <!ENTITY ssl-observatory.prefs.alt_roots 
-"Submit and check certificates signed by non-standard root CAs">
+"Aplicar y verificar los certificados firmados por CAs no estandar">
 
 <!ENTITY ssl-observatory.prefs.alt_roots_tooltip 
 "It is safe (and a good idea) to enable this option, unless you use an intrusive corporate network or Kaspersky antivirus software that monitors your browsing with a TLS proxy and a private root Certificate Authority.  If enabled on such a network, this option might publish evidence of which https:// domains were being visited through that proxy, because of the unique certificates it would produce.  So we leave it off by default.">

_______________________________________________
tor-commits mailing list
tor-commits@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits