[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[tor-commits] [translation/https_everywhere] Update translations for https_everywhere
commit d5dd2ae9bf231b5c8baf6809fcff53052e4c7b59
Author: Translation commit bot <translation@xxxxxxxxxxxxxx>
Date: Fri Oct 17 13:45:26 2014 +0000
Update translations for https_everywhere
---
sl_SI/ssl-observatory.dtd | 30 +++++++++++++++---------------
1 file changed, 15 insertions(+), 15 deletions(-)
diff --git a/sl_SI/ssl-observatory.dtd b/sl_SI/ssl-observatory.dtd
index 281c7fb..e115c12 100644
--- a/sl_SI/ssl-observatory.dtd
+++ b/sl_SI/ssl-observatory.dtd
@@ -1,11 +1,11 @@
<!-- Observatory popup window -->
<!ENTITY ssl-observatory.popup.details "Podrobnosti in informacije o zasebnosti">
-<!ENTITY ssl-observatory.popup.later "Ask Me Later">
+<!ENTITY ssl-observatory.popup.later "Vprašaj me kasneje">
<!ENTITY ssl-observatory.popup.no "Ne">
-<!ENTITY ssl-observatory.popup.text "HTTPS Everywhere can detect attacks
-against your browser by sending the certificates you receive to the
-Observatory. Turn this on?">
+<!ENTITY ssl-observatory.popup.text "HTTPS Povsod lahko zazna napade
+na vaš brskalnik tako, da pošlje certifikate ki jih prejmete v
+Observatorij. Želite to vkljuÄ?iti?">
<!--<!ENTITY ssl-observatory.popup.text
"EFF's SSL Observatory can detect attacks against HTTPS websites by collecting
@@ -13,33 +13,33 @@ and auditing the certificates being presented to your browser. Would you like
to turn it on?">-->
<!ENTITY ssl-observatory.popup.title
-"Should HTTPS Everywhere use the SSL Observatory?">
+"Ali naj HTTPS Everywhere uporablja SSL Observatorij?">
-<!ENTITY ssl-observatory.popup.yes "Yes">
+<!ENTITY ssl-observatory.popup.yes "Da">
<!-- Observatory preferences dialog -->
<!ENTITY ssl-observatory.prefs.adv_priv_opts1
-"It is safe to enable this, unless you use a very
-intrusive corporate network:">
+"To omogoÄ?anje je varno dokler ne uporabite zelo
+vsiljivo poslovno omrežje:">
<!ENTITY ssl-observatory.prefs.adv_priv_opts2
-"Safe, unless you use a corporate network with secret intranet server names:">
+"Varno dokler ne uporabite poslovno omrežje s tajnimi imeni intranet strežnikov:">
<!ENTITY ssl-observatory.prefs.alt_roots
-"Submit and check certificates signed by non-standard root CAs">
+"Predloži in preveri certifikate nestandardnih overoviteljev">
<!ENTITY ssl-observatory.prefs.alt_roots_tooltip
-"It is safe (and a good idea) to enable this option, unless you use an intrusive corporate network or Kaspersky antivirus software that monitors your browsing with a TLS proxy and a private root Certificate Authority. If enabled on such a network, this option might publish evidence of which https:// domains were being visited through that proxy, because of the unique certificates it would produce. So we leave it off by default.">
+"OmogoÄ?anje tega je varno (in priporoÄ?ljivo), razen Ä?e uporabljate vsiljivo poslovno omrežje ali protivirusni program Kaspersky, ki spremlja vaÅ¡e brskanje s TLS proksijem in privatnim overoviteljem certifikatov. Ä?e je omogoÄ?eno v takem omrežju lahko ta možnost objavi dokazila o tem, katere https:// domene so bile obiskane preko tega proksija, ker bi ustvarila edinstvene certifikate. Zato je to privzeto izkljuÄ?eno.">
-<!ENTITY ssl-observatory.prefs.anonymous "Check certificates using Tor for anonymity">
+<!ENTITY ssl-observatory.prefs.anonymous "Preveri certifikate z uporabo Tor anonimnosti">
<!ENTITY ssl-observatory.prefs.anonymous_unavailable
-"Check certificates using Tor for anonymity (requires Tor)">
+"Preveri certifikate z uporabo Tor anonimnosti (potreben Tor)">
<!ENTITY ssl-observatory.prefs.anonymous_tooltip
-"This option requires Tor to be installed and running">
+"Ta opcija potrebuje nameÅ¡Ä?en in zagnan Tor">
<!ENTITY ssl-observatory.prefs.asn
-"When you see a new certificate, tell the Observatory which ISP you are connected to">
+"Ko vidite nov certifikat povejte Observatoriju h kateremu ISP-ju ste prikljuÄ?eni">
<!ENTITY ssl-observatory.prefs.asn_tooltip
"This will fetch and send the "Autonomous System number" of your network. This will help us locate attacks against HTTPS, and to determine whether we have observations from networks in places like Iran and Syria where attacks are comparatively common.">
_______________________________________________
tor-commits mailing list
tor-commits@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits