Author: toad
Date: 2008-11-14 13:09:07 +0000 (Fri, 14 Nov 2008)
New Revision: 23571

Modified:
   trunk/freenet/src/freenet/l10n/freenet.l10n.en.properties
Log:
Spelling


Modified: trunk/freenet/src/freenet/l10n/freenet.l10n.en.properties
===================================================================
--- trunk/freenet/src/freenet/l10n/freenet.l10n.en.properties   2008-11-14 
13:08:14 UTC (rev 23570)
+++ trunk/freenet/src/freenet/l10n/freenet.l10n.en.properties   2008-11-14 
13:09:07 UTC (rev 23571)
@@ -706,8 +706,8 @@
 Node.opennetEnabledLong=Enable insecure mode (aka opennet)? If this is 
enabled, the node will automatically exchange node references with other 
untrusted nodes (Strangers as opposed to Friends). But this means that the fact 
that you are running a node is no longer private, and many attacks are much 
easier. If you know enough people running Freenet, you should stick to trusted 
(Friends) connections to them, and turn this off.
 Node.outBWLimit=Output bandwidth limit (bytes per second)
 Node.outBWLimitLong=Hard output bandwidth limit (bytes/sec); the node should 
almost never exceed this
-Node.paddDataPackets=Padd data packets sent by the node with random-length 
content? (READ WARNING!)
-Node.paddDataPacketsLong=Padd data packets sent by the node with random-length 
content? For security, on a single node, this is bad; if a large part of the 
network starts doing it, we become very vulnerable to a passive attacker. 
However, it should improve performance, particularly the payload percentage. 
You have been warned!
+Node.paddDataPackets=Pad data packets sent by the node with random-length 
content? (READ WARNING!)
+Node.paddDataPacketsLong=Pad data packets sent by the node with random-length 
content? For security, on a single node, this is bad; if a large part of the 
network starts doing it, we become very vulnerable to a passive attacker. 
However, it should improve performance, particularly the payload percentage. 
You have been warned!
 Node.passOpennetPeersThroughDarknet=Relay opennet noderefs through darknet 
peers?
 Node.passOpennetPeersThroughDarknetLong=If true, opennet noderefs (NEVER our 
own darknet noderef) will be relayed through our darknet peers. So a node (this 
node, or its peers) can get opennet peers from its darknet peers. This is 
useful because it allows us to bootstrap new opennet peers after having lost 
our peers due to downtime, for example. However, it may make traffic analysis 
slightly easier, so turn it off if you are paranoid.
 Node.port=FNP port number (UDP)

_______________________________________________
cvs mailing list
[email protected]
http://emu.freenetproject.org/cgi-bin/mailman/listinfo/cvs

Reply via email to