forked from I2P_Developers/i2p.www
Updated translation strings
This commit is contained in:
File diff suppressed because it is too large
Load Diff
@@ -8,7 +8,7 @@ msgid ""
|
||||
msgstr ""
|
||||
"Project-Id-Version: I2P\n"
|
||||
"Report-Msgid-Bugs-To: http://trac.i2p2.de\n"
|
||||
"POT-Creation-Date: 2014-02-14 11:46+0000\n"
|
||||
"POT-Creation-Date: 2014-02-17 21:36+0000\n"
|
||||
"PO-Revision-Date: 2014-02-16 04:03+0000\n"
|
||||
"Last-Translator: plazmism <gomidori@live.jp>\n"
|
||||
"Language-Team: Japanese "
|
||||
@@ -46,6 +46,7 @@ msgstr "ファイルは`ダウンロードページ`_で利用できます。"
|
||||
#: i2p2www/blog/2012/12/17/0.9.4-Release.rst:30
|
||||
#: i2p2www/blog/2013/03/08/0.9.5-Release.rst:23
|
||||
#: i2p2www/blog/2013/05/28/0.9.6-Release.rst:23
|
||||
#: i2p2www/blog/2014/02/16/i2pbrowser-malware.rst:39
|
||||
msgid "`download page`"
|
||||
msgstr "`ダウンロードページ`"
|
||||
|
||||
@@ -1776,3 +1777,76 @@ msgstr "転送で使用されるメモリの大きな削減"
|
||||
msgid "All in-net updates via torrent"
|
||||
msgstr "torrent 経由で完全なネット内アップデート"
|
||||
|
||||
#: i2p2www/blog/2014/02/16/i2pbrowser-malware.rst:1
|
||||
#, fuzzy
|
||||
msgid ""
|
||||
"=========================\n"
|
||||
"Malware at i2pbrowser.net\n"
|
||||
"========================="
|
||||
msgstr ""
|
||||
"=====================\n"
|
||||
"Syndie 1.105b リリース\n"
|
||||
"====================="
|
||||
|
||||
#: i2p2www/blog/2014/02/16/i2pbrowser-malware.rst:8
|
||||
msgid ""
|
||||
"The site i2pbrowser.net is a fake I2P website mirror serving up malware "
|
||||
"for Windows."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/blog/2014/02/16/i2pbrowser-malware.rst:10
|
||||
msgid ""
|
||||
"We have recently been made aware of the existence of i2pbrowser.net. This"
|
||||
"\n"
|
||||
"website copies our homepage and download page, and attempts to trick "
|
||||
"users into\n"
|
||||
"downloading Windows malware."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/blog/2014/02/16/i2pbrowser-malware.rst:16
|
||||
msgid ""
|
||||
"There are several indicators that point to i2pbrowser.net being a malware"
|
||||
" site:"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/blog/2014/02/16/i2pbrowser-malware.rst:20
|
||||
msgid "The domain was registered on February 10th, 2014."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/blog/2014/02/16/i2pbrowser-malware.rst:21
|
||||
msgid ""
|
||||
"The download URLs for Windows, Mac OSX, Linux, Android etc. all link to "
|
||||
"the same .exe file."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/blog/2014/02/16/i2pbrowser-malware.rst:22
|
||||
msgid "The .exe is only 741 KB; the official Windows installer for I2P is 13 MB."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/blog/2014/02/16/i2pbrowser-malware.rst:24
|
||||
msgid ""
|
||||
"We have not examined the malware ourselves, but it does not appear to be "
|
||||
"very\n"
|
||||
"sophisticated; it is not integrated into or bundled with the I2P "
|
||||
"software.\n"
|
||||
"Information security expert `Lance James`_ posted `a tweet`_ labelling it"
|
||||
" as\n"
|
||||
"\"a standard dark comet rat\"."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/blog/2014/02/16/i2pbrowser-malware.rst:31
|
||||
msgid ""
|
||||
"Spread the word. The only offical download locations for I2P are linked "
|
||||
"on our\n"
|
||||
"`download page`_. All I2P download packages are GPG-signed by the\n"
|
||||
"`release signing key`_."
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/blog/2014/02/16/i2pbrowser-malware.rst:38
|
||||
msgid "`a tweet`"
|
||||
msgstr ""
|
||||
|
||||
#: i2p2www/blog/2014/02/16/i2pbrowser-malware.rst:40
|
||||
msgid "`release signing key`"
|
||||
msgstr ""
|
||||
|
||||
|
Reference in New Issue
Block a user