commit 5a10bb3372e95532130c7f10495ab5e6360d8c7d Author: Translation commit bot translation@torproject.org Date: Sun Aug 10 15:15:14 2014 +0000
Update translations for https_everywhere --- es_AR/ssl-observatory.dtd | 18 +++++++++--------- 1 file changed, 9 insertions(+), 9 deletions(-)
diff --git a/es_AR/ssl-observatory.dtd b/es_AR/ssl-observatory.dtd index 8191175..12bc1f3 100644 --- a/es_AR/ssl-observatory.dtd +++ b/es_AR/ssl-observatory.dtd @@ -1,6 +1,6 @@ <!-- Observatory popup window --> -<!ENTITY ssl-observatory.popup.details "Details and Privacy Information"> -<!ENTITY ssl-observatory.popup.later "Ask Me Later"> +<!ENTITY ssl-observatory.popup.details "Detalles e información privada"> +<!ENTITY ssl-observatory.popup.later "Preguntarme después"> <!ENTITY ssl-observatory.popup.no "No">
<!ENTITY ssl-observatory.popup.text "HTTPS Everywhere can detect attacks @@ -15,7 +15,7 @@ to turn it on?">--> <!ENTITY ssl-observatory.popup.title "Should HTTPS Everywhere use the SSL Observatory?">
-<!ENTITY ssl-observatory.popup.yes "Yes"> +<!ENTITY ssl-observatory.popup.yes "Si">
<!-- Observatory preferences dialog -->
@@ -24,7 +24,7 @@ to turn it on?">--> intrusive corporate network:">
<!ENTITY ssl-observatory.prefs.adv_priv_opts2 -"Safe, unless you use a corporate network with secret intranet server names:"> +"Seguro, a menos que utilice una red corporativa con nombres secretos de servidor de intranet:">
<!ENTITY ssl-observatory.prefs.alt_roots "Submit and check certificates signed by non-standard root CAs"> @@ -32,11 +32,11 @@ intrusive corporate network:"> <!ENTITY ssl-observatory.prefs.alt_roots_tooltip "It is safe (and a good idea) to enable this option, unless you use an intrusive corporate network or Kaspersky antivirus software that monitors your browsing with a TLS proxy and a private root Certificate Authority. If enabled on such a network, this option might publish evidence of which https:// domains were being visited through that proxy, because of the unique certificates it would produce. So we leave it off by default.">
-<!ENTITY ssl-observatory.prefs.anonymous "Check certificates using Tor for anonymity"> +<!ENTITY ssl-observatory.prefs.anonymous "Compruebe certificados usando Tor para el anonimato"> <!ENTITY ssl-observatory.prefs.anonymous_unavailable -"Check certificates using Tor for anonymity (requires Tor)"> +"Compruebe certificados usando Tor para el anonimato (requiere Tor)"> <!ENTITY ssl-observatory.prefs.anonymous_tooltip -"This option requires Tor to be installed and running"> +"Esta opción requiere Tor para ser instalado y en ejecución">
<!ENTITY ssl-observatory.prefs.asn "When you see a new certificate, tell the Observatory which ISP you are connected to"> @@ -70,7 +70,7 @@ received by the Observatory will indicate that somebody visited www.something.com, but not who visited the site, or what specific page they looked at. Mouseover the options for further details:">
-<!ENTITY ssl-observatory.prefs.hide "Hide advanced options"> +<!ENTITY ssl-observatory.prefs.hide "Ocultar opciones avanzadas">
<!ENTITY ssl-observatory.prefs.nonanon "Check certificates even if Tor is not available"> @@ -84,7 +84,7 @@ looked at. Mouseover the options for further details:"> <!ENTITY ssl-observatory.prefs.priv_dns_tooltip "Unless this option is checked, the Observatory will not record certificates for names that it cannot resolve through the DNS system.">
-<!ENTITY ssl-observatory.prefs.show "Show advanced options"> +<!ENTITY ssl-observatory.prefs.show "Mostrar opciones avanzadas">
<!ENTITY ssl-observatory.prefs.title "SSL Observatory Preferences">
tor-commits@lists.torproject.org