Package: prey
Version: N/A
Severity: normal
Tags: patch

Dear Debian maintainer,

On Thursday, February 17, 2011, I notified you of the beginning of a review 
process
concerning debconf templates for prey.

The debian-l10n-english contributors have now reviewed these templates,
and the proposed changes are attached to this bug report.

Please review the suggested changes, and if you have any
objections, let me know in the next 3 days.

However, please try to avoid uploading prey with these changes
right now.

The second phase of this process will begin on Sunday, March 13, 2011, when I 
will
coordinate updates to translations of debconf templates.

The existing translators will be notified of the changes: they will
receive an updated PO file for their language.

Simultaneously, a general call for new translations will be sent to
the debian-i18n mailing list.

Both these calls for translations will request updates to be sent as
individual bug reports. That will probably trigger a lot of bug
reports against your package, but these should be easier to deal with.

The call for translation updates and new translations will run until
about Sunday, April 03, 2011. Please avoid uploading a package with fixed or 
changed
debconf templates and/or translation updates in the meantime. Of
course, other changes are safe.

Please note that this is an approximative delay, which depends on my
own availability to process this work and is influenced by the fact
that I simultaneously work on many packages.

Around Monday, April 04, 2011, I will contact you again and will send a final 
patch
summarizing all the updates (changes to debconf templates,
updates to debconf translations and new debconf translations).

Again, thanks for your attention and cooperation.


-- System Information:
Debian Release: wheezy/sid
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: i386 (i686)

Kernel: Linux 2.6.37-1-686 (SMP w/2 CPU cores)
Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968)
Shell: /bin/sh linked to /bin/dash
--- prey.old/debian/templates   2011-02-13 11:18:29.483538793 +0100
+++ prey/debian/templates       2011-03-10 07:23:09.016569781 +0100
@@ -1,34 +1,49 @@
+# These templates have been reviewed by the debian-l10n-english
+# team
+#
+# If modifications/additions/rewording are needed, please ask
+# [email protected] for advice.
+#
+# Even minor modifications require translation updates and such
+# changes should be coordinated with translators and reviewers.
+
 Template: prey/reporting_frequency
 Type: string
 Default: 20
-_Description: Frequency of reports and actions:
- Number of minutes to wait before waking up Prey. Control Panel users can
- change this settings later on the web.
+_Description: Frequency of Prey reports and actions (minutes):
+ Please enter the time to wait before waking up Prey. Control Panel users can
+ change this setting later through the web interface.
 
 Template: prey/active_modules
 Type: multiselect
 Choices: ${choices}
 Default: alarm
-_Description: Modules:
- Modules extend application functionality, there are two types of modules
- available: Report and Actions modules.
+_Description: Modules to enable:
+ Prey has many optional modules; if enabled they will be triggered
+ automatically if prey recognizes that the device is stolen.
  .
-  * network: collect information about the Internet connection.
-  * session: take a screenshot, collect information about modified files and 
running programs.
-  * webcam: try to take a picture using the webcam.
-  * geo: attempt lo geolocate the device by using its interal GPS or the 
nearest WiFi access points as reference.
-  * alarm: play a loud sound for 30 seconds.
-  * alert: show the thier a short message and optionally change the wallpaper.
-  * lock: lock the laptop from being used and ask for a password.
-  * secure: delete browser cookies and stored passwords.
+  * alarm:   plays a loud sound for 30 seconds;
+  * alert:   shows the thief a short message (and may change the
+             wallpaper);
+  * geo:     attempts to geolocate the device by using its internal
+             GPS or the nearest WiFi access points as reference;
+  * lock:    locks the device and asks for a password;
+  * network: collects information about the Internet connection;
+  * secure:  deletes browser cookies and stored passwords;
+  * session: takes a screenshot, collects information about modified
+             files and running programs;
+  * webcam:  tries to take a picture using the webcam.
 
 Template: prey/edit_config
 Type: note
-_Description: Finalize the configuration
- In order to finalize the configuration, it needs to choose which mode Prey 
should run in.
- This can be achieved by editing the file `/etc/prey/config' by hand, 
according to own preferences:
+_Description: Configuration required
+ To finish configuring Prey, you need to edit "/etc/prey/config" and
+ choose its running mode. The options are:
  .
-  * Standalone: Reports are sent directly to the laptop's owner.
-    This requires user to activate Prey by generating/deleting a URL and set 
up a scp/sftp/mail server settings as well.
-  * Control Panel: Reports are sent to preyproject.com.
-    After obtaining an account at http://control.preyproject.com/signup users 
only need to set 'apt_key' and 'device_key' properly in the `/etc/prey/config' 
file.
+  * Control Panel: reports are sent to preyproject.com. Go to
+                   http://control.preyproject.com/signup and create
+                   an account, then set "apt_key" and "device_key"
+                   appropriately in the configuration file.
+  * Standalone:    reports are sent directly to the owner at a
+                   specified mail or SSH (scp/sftp) server when
+                   activated via a trigger URL under your control.
--- prey.old/debian/control     2011-02-13 11:18:29.483538793 +0100
+++ prey/debian/control 2011-02-21 19:16:40.682818251 +0100
@@ -26,10 +26,9 @@
 Recommends: python (>= 2.5),
  python-gtk2
 Description: utility for tracking stolen computers
- Prey is a lightweight program that will help you track and find your laptop if
- it ever gets stolen.
+ Prey is a lightweight program to help track and recover a stolen laptop.
  .
- Prey comprises a shell script which calls out on a regular basis to
- either a server run by prey project, or a url nominated by the system
- administrator. A graphical configuration tool is also provided which is
- used to maintain the simple config file.
+ It comprises a shell script which calls out on a regular basis to
+ either a server run by the Prey project, or a URL defined by the system
+ administrator. A graphical configuration tool is also provided in
+ order to maintain the simple config file.

Reply via email to