commit 656781d8a9069bb4da19c76e47c02a05338bec80
Author: Translation commit bot <translation(a)torproject.org>
Date: Sat Jun 25 18:45:30 2016 +0000
Update translations for https_everywhere
---
nn/https-everywhere.dtd | 26 +++++++++++++-------------
nn/ssl-observatory.dtd | 27 ++++++++++++++-------------
2 files changed, 27 insertions(+), 26 deletions(-)
diff --git a/nn/https-everywhere.dtd b/nn/https-everywhere.dtd
index f1c7815..c39c8ca 100644
--- a/nn/https-everywhere.dtd
+++ b/nn/https-everywhere.dtd
@@ -5,17 +5,17 @@
<!ENTITY https-everywhere.about.created_by "Laga av">
<!ENTITY https-everywhere.about.and ", og">
<!ENTITY https-everywhere.about.librarians "Regelsettbibliotekarar">
-<!ENTITY https-everywhere.about.add_new_rule "Add New Rule">
+<!ENTITY https-everywhere.about.add_new_rule "Legg til ny regel">
<!ENTITY https-everywhere.about.thanks "Takk til">
-<!ENTITY https-everywhere.about.many_contributors "Many many contributors, including">
-<!ENTITY https-everywhere.about.noscript "Also, portions of HTTPS Everywhere are based on code from NoScript, by Giorgio Maone and others. We are grateful for their excellent work!">
+<!ENTITY https-everywhere.about.many_contributors "Mange mange bidragsytarar, medrekna">
+<!ENTITY https-everywhere.about.noscript "Dessutan er delar av HTTPS Everywhere basert på kode frå NoScript av Giorgio Maone og andre. Me er takksame for det framifrå arbeidet deira!">
<!ENTITY https-everywhere.about.contribute "Om du likar HTTPS Everywhere, kunne du kanskje vurdere å ">
<!ENTITY https-everywhere.about.donate_tor "Donere til Tor">
<!ENTITY https-everywhere.about.tor_lang_code "en">
<!ENTITY https-everywhere.about.or "eller">
<!ENTITY https-everywhere.about.donate_eff "Donerer til EFF">
-<!ENTITY https-everywhere.menu.donate_eff_imperative "Donate to EFF">
+<!ENTITY https-everywhere.menu.donate_eff_imperative "Doner til EFF">
<!ENTITY https-everywhere.menu.about "Om HTTPS Everywhere">
<!ENTITY https-everywhere.menu.observatory "SSL Observatory Innstillingar">
<!ENTITY https-everywhere.menu.globalEnable "Slå på HTTPS Everywhere">
@@ -39,18 +39,18 @@
<!ENTITY https-everywhere.prefs.reset_default "Still tilbake til standard">
<!ENTITY https-everywhere.prefs.view_xml_source "Vis XML-kjelde">
-<!ENTITY https-everywhere.chrome.stable_rules "Stable rules">
-<!ENTITY https-everywhere.chrome.stable_rules_description "Force encrypted connections to these websites:">
-<!ENTITY https-everywhere.chrome.experimental_rules "Experimental rules">
-<!ENTITY https-everywhere.chrome.experimental_rules_description "May cause warnings or breakage. Disabled by default.">
-<!ENTITY https-everywhere.chrome.add_rule "Add a rule for this site">
-<!ENTITY https-everywhere.chrome.add_new_rule "Add a new rule for this site">
-<!ENTITY https-everywhere.chrome.always_https_for_host "Always use https for this host">
+<!ENTITY https-everywhere.chrome.stable_rules "Støduge reglar">
+<!ENTITY https-everywhere.chrome.stable_rules_description "Tving krypterte tilkoplingar åt desse nettstadane:">
+<!ENTITY https-everywhere.chrome.experimental_rules "Reglar på prøve">
+<!ENTITY https-everywhere.chrome.experimental_rules_description "Kan vera årsak åt åtvaringar eller brot. Slegne av som standard.">
+<!ENTITY https-everywhere.chrome.add_rule "Legg til ein regel for denne nettstaden">
+<!ENTITY https-everywhere.chrome.add_new_rule "Legg til ein ny regel for denne nettstaden">
+<!ENTITY https-everywhere.chrome.always_https_for_host "Nytt alltid https for denne verten">
<!ENTITY https-everywhere.chrome.host "Vert:">
<!ENTITY https-everywhere.chrome.show_advanced "Vis avansert">
<!ENTITY https-everywhere.chrome.hide_advanced "Gøym avansert">
-<!ENTITY https-everywhere.chrome.rule_name "Rule name">
-<!ENTITY https-everywhere.chrome.regex "Matching regex">
+<!ENTITY https-everywhere.chrome.rule_name "Namn på regelen:">
+<!ENTITY https-everywhere.chrome.regex "Som passar med regex">
<!ENTITY https-everywhere.chrome.redirect_to "Omdiriger til">
<!ENTITY https-everywhere.chrome.status_cancel_button "Avbryt">
diff --git a/nn/ssl-observatory.dtd b/nn/ssl-observatory.dtd
index baa4f3b..dd31e54 100644
--- a/nn/ssl-observatory.dtd
+++ b/nn/ssl-observatory.dtd
@@ -3,9 +3,9 @@
<!ENTITY ssl-observatory.popup.later "Spør meg seinare">
<!ENTITY ssl-observatory.popup.no "Nei">
-<!ENTITY ssl-observatory.popup.text "HTTPS Everywhere can detect attacks
-against your browser by sending the certificates you receive to the
-Observatory. Turn this on?">
+<!ENTITY ssl-observatory.popup.text "HTTPS Everywhere kan uppdaga åtak
+på nettlesaren din ved å sende sertifikati du mottek åt Observatoriet.
+Slå på dette?">
<!--<!ENTITY ssl-observatory.popup.text
"EFF's SSL Observatory can detect attacks against HTTPS websites by collecting
@@ -20,29 +20,30 @@ to turn it on?">-->
<!-- Observatory preferences dialog -->
<!ENTITY ssl-observatory.prefs.adv_priv_opts1
-"It is safe to enable this, unless you use a very
-intrusive corporate network:">
+"Det er trygt å slå på dette, med mindre du nyttar
+eit sers inngripande verksemdnettverk:">
<!ENTITY ssl-observatory.prefs.adv_priv_opts2
-"Safe, unless you use a corporate network with secret intranet server names:">
+"Trygt, med mindre du nyttar eit verksemdnettverk med løynlege intranett-
+tenarnamn:">
<!ENTITY ssl-observatory.prefs.alt_roots
-"Submit and check certificates signed by non-standard root CAs">
+"Send inn og sjekk attestar underskrevne av ikkjestandard rot-CA'ar">
<!ENTITY ssl-observatory.prefs.alt_roots_tooltip
-"It is safe (and a good idea) to enable this option, unless you use an intrusive corporate network or Kaspersky antivirus software that monitors your browsing with a TLS proxy and a private root Certificate Authority. If enabled on such a network, this option might publish evidence of which https:// domains were being visited through that proxy, because of the unique certificates it would produce. So we leave it off by default.">
+"Det er trygt (og ein god idé) å slå på dette valet, med mindre du nyttar eit inngripande verksemdnettverk eller Kaspersky motvirusprogramvare som yvervakar nettlesingi di med ein TLS-proxy og ein privat rotsertifikatautoritet. Um det er slege på på soleis eit nettverk, kan dette valet gjeve ut prov på kva https://-domene som vart vitja gjennum den proxyen, på grunn av dei sereigne sertifikati det ville laga. So me let det vera av som standard.">
-<!ENTITY ssl-observatory.prefs.anonymous "Check certificates using Tor for anonymity">
+<!ENTITY ssl-observatory.prefs.anonymous "Sjekk sertifikat ved hjelp av Tor for anonymitet">
<!ENTITY ssl-observatory.prefs.anonymous_unavailable
-"Check certificates using Tor for anonymity (requires Tor)">
+"Sjekk sertifikat ved hjelp av Tor for anonymitet (krev Tor)">
<!ENTITY ssl-observatory.prefs.anonymous_tooltip
-"This option requires Tor to be installed and running">
+"Dette valet krev at Tor er installert og køyrar">
<!ENTITY ssl-observatory.prefs.asn
-"When you see a new certificate, tell the Observatory which ISP you are connected to">
+"Når du ser eit nytt sertifikat, fortel Observatoriet kva for ISP du er kopla åt.">
<!ENTITY ssl-observatory.prefs.asn_tooltip
-"This will fetch and send the "Autonomous System number" of your network. This will help us locate attacks against HTTPS, and to determine whether we have observations from networks in places like Iran and Syria where attacks are comparatively common.">
+"Dette vil henta og senda det "Autonome Systemtalet" åt nettverket ditt. Dette vil hjelpe oss med å plassera åtak mot HTTPS, og med å avgjere um me hev åtgangingar frå nettverk på stadar soleis som Iran og Syria, kor åtak er jamførd vanlege.">
<!ENTITY ssl-observatory.prefs.show_cert_warning
"Show a warning when the Observatory detects a revoked certificate not caught by your browser">