[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[tor-commits] [translation/https_everywhere] Update translations for https_everywhere



commit 5a10bb3372e95532130c7f10495ab5e6360d8c7d
Author: Translation commit bot <translation@xxxxxxxxxxxxxx>
Date:   Sun Aug 10 15:15:14 2014 +0000

    Update translations for https_everywhere
---
 es_AR/ssl-observatory.dtd |   18 +++++++++---------
 1 file changed, 9 insertions(+), 9 deletions(-)

diff --git a/es_AR/ssl-observatory.dtd b/es_AR/ssl-observatory.dtd
index 8191175..12bc1f3 100644
--- a/es_AR/ssl-observatory.dtd
+++ b/es_AR/ssl-observatory.dtd
@@ -1,6 +1,6 @@
 <!-- Observatory popup window -->
-<!ENTITY ssl-observatory.popup.details "Details and Privacy Information">
-<!ENTITY ssl-observatory.popup.later "Ask Me Later">
+<!ENTITY ssl-observatory.popup.details "Detalles e información privada">
+<!ENTITY ssl-observatory.popup.later "Preguntarme después">
 <!ENTITY ssl-observatory.popup.no "No">
 
 <!ENTITY ssl-observatory.popup.text "HTTPS Everywhere can detect attacks
@@ -15,7 +15,7 @@ to turn it on?">-->
 <!ENTITY ssl-observatory.popup.title 
 "Should HTTPS Everywhere use the SSL Observatory?">
 
-<!ENTITY ssl-observatory.popup.yes "Yes">
+<!ENTITY ssl-observatory.popup.yes "Si">
 
 <!-- Observatory preferences dialog -->
 
@@ -24,7 +24,7 @@ to turn it on?">-->
 intrusive corporate network:">
 
 <!ENTITY ssl-observatory.prefs.adv_priv_opts2
-"Safe, unless you use a corporate network with secret intranet server names:">
+"Seguro, a menos que utilice una red corporativa con nombres secretos de servidor de intranet:">
 
 <!ENTITY ssl-observatory.prefs.alt_roots 
 "Submit and check certificates signed by non-standard root CAs">
@@ -32,11 +32,11 @@ intrusive corporate network:">
 <!ENTITY ssl-observatory.prefs.alt_roots_tooltip 
 "It is safe (and a good idea) to enable this option, unless you use an intrusive corporate network or Kaspersky antivirus software that monitors your browsing with a TLS proxy and a private root Certificate Authority.  If enabled on such a network, this option might publish evidence of which https:// domains were being visited through that proxy, because of the unique certificates it would produce.  So we leave it off by default.">
 
-<!ENTITY ssl-observatory.prefs.anonymous "Check certificates using Tor for anonymity">
+<!ENTITY ssl-observatory.prefs.anonymous "Compruebe certificados usando Tor para el anonimato">
 <!ENTITY ssl-observatory.prefs.anonymous_unavailable 
-"Check certificates using Tor for anonymity (requires Tor)">
+"Compruebe certificados usando Tor para el anonimato (requiere Tor)">
 <!ENTITY ssl-observatory.prefs.anonymous_tooltip 
-"This option requires Tor to be installed and running">
+"Esta opción requiere Tor para ser instalado y en ejecución">
 
 <!ENTITY ssl-observatory.prefs.asn 
 "When you see a new certificate, tell the Observatory which ISP you are connected to">
@@ -70,7 +70,7 @@ received by the Observatory will indicate that somebody visited
 www.something.com, but not who visited the site, or what specific page they
 looked at.  Mouseover the options for further details:">
 
-<!ENTITY ssl-observatory.prefs.hide "Hide advanced options">
+<!ENTITY ssl-observatory.prefs.hide "Ocultar opciones avanzadas">
 
 <!ENTITY ssl-observatory.prefs.nonanon 
 "Check certificates even if Tor is not available">
@@ -84,7 +84,7 @@ looked at.  Mouseover the options for further details:">
 <!ENTITY ssl-observatory.prefs.priv_dns_tooltip
 "Unless this option is checked, the Observatory will not record certificates for names that it cannot resolve through the DNS system.">
 
-<!ENTITY ssl-observatory.prefs.show "Show advanced options">
+<!ENTITY ssl-observatory.prefs.show "Mostrar opciones avanzadas">
 
 <!ENTITY ssl-observatory.prefs.title "SSL Observatory Preferences">
 

_______________________________________________
tor-commits mailing list
tor-commits@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits