Package: prey Version: N/A Severity: normal Tags: patch Dear Debian maintainer,
On Thursday, February 17, 2011, I notified you of the beginning of a review process concerning debconf templates for prey. The debian-l10n-english contributors have now reviewed these templates, and the proposed changes are attached to this bug report. Please review the suggested changes, and if you have any objections, let me know in the next 3 days. However, please try to avoid uploading prey with these changes right now. The second phase of this process will begin on Sunday, March 13, 2011, when I will coordinate updates to translations of debconf templates. The existing translators will be notified of the changes: they will receive an updated PO file for their language. Simultaneously, a general call for new translations will be sent to the debian-i18n mailing list. Both these calls for translations will request updates to be sent as individual bug reports. That will probably trigger a lot of bug reports against your package, but these should be easier to deal with. The call for translation updates and new translations will run until about Sunday, April 03, 2011. Please avoid uploading a package with fixed or changed debconf templates and/or translation updates in the meantime. Of course, other changes are safe. Please note that this is an approximative delay, which depends on my own availability to process this work and is influenced by the fact that I simultaneously work on many packages. Around Monday, April 04, 2011, I will contact you again and will send a final patch summarizing all the updates (changes to debconf templates, updates to debconf translations and new debconf translations). Again, thanks for your attention and cooperation. -- System Information: Debian Release: wheezy/sid APT prefers unstable APT policy: (500, 'unstable') Architecture: i386 (i686) Kernel: Linux 2.6.37-1-686 (SMP w/2 CPU cores) Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968) Shell: /bin/sh linked to /bin/dash
--- prey.old/debian/templates 2011-02-13 11:18:29.483538793 +0100 +++ prey/debian/templates 2011-03-10 07:23:09.016569781 +0100 @@ -1,34 +1,49 @@ +# These templates have been reviewed by the debian-l10n-english +# team +# +# If modifications/additions/rewording are needed, please ask +# [email protected] for advice. +# +# Even minor modifications require translation updates and such +# changes should be coordinated with translators and reviewers. + Template: prey/reporting_frequency Type: string Default: 20 -_Description: Frequency of reports and actions: - Number of minutes to wait before waking up Prey. Control Panel users can - change this settings later on the web. +_Description: Frequency of Prey reports and actions (minutes): + Please enter the time to wait before waking up Prey. Control Panel users can + change this setting later through the web interface. Template: prey/active_modules Type: multiselect Choices: ${choices} Default: alarm -_Description: Modules: - Modules extend application functionality, there are two types of modules - available: Report and Actions modules. +_Description: Modules to enable: + Prey has many optional modules; if enabled they will be triggered + automatically if prey recognizes that the device is stolen. . - * network: collect information about the Internet connection. - * session: take a screenshot, collect information about modified files and running programs. - * webcam: try to take a picture using the webcam. - * geo: attempt lo geolocate the device by using its interal GPS or the nearest WiFi access points as reference. - * alarm: play a loud sound for 30 seconds. - * alert: show the thier a short message and optionally change the wallpaper. - * lock: lock the laptop from being used and ask for a password. - * secure: delete browser cookies and stored passwords. + * alarm: plays a loud sound for 30 seconds; + * alert: shows the thief a short message (and may change the + wallpaper); + * geo: attempts to geolocate the device by using its internal + GPS or the nearest WiFi access points as reference; + * lock: locks the device and asks for a password; + * network: collects information about the Internet connection; + * secure: deletes browser cookies and stored passwords; + * session: takes a screenshot, collects information about modified + files and running programs; + * webcam: tries to take a picture using the webcam. Template: prey/edit_config Type: note -_Description: Finalize the configuration - In order to finalize the configuration, it needs to choose which mode Prey should run in. - This can be achieved by editing the file `/etc/prey/config' by hand, according to own preferences: +_Description: Configuration required + To finish configuring Prey, you need to edit "/etc/prey/config" and + choose its running mode. The options are: . - * Standalone: Reports are sent directly to the laptop's owner. - This requires user to activate Prey by generating/deleting a URL and set up a scp/sftp/mail server settings as well. - * Control Panel: Reports are sent to preyproject.com. - After obtaining an account at http://control.preyproject.com/signup users only need to set 'apt_key' and 'device_key' properly in the `/etc/prey/config' file. + * Control Panel: reports are sent to preyproject.com. Go to + http://control.preyproject.com/signup and create + an account, then set "apt_key" and "device_key" + appropriately in the configuration file. + * Standalone: reports are sent directly to the owner at a + specified mail or SSH (scp/sftp) server when + activated via a trigger URL under your control. --- prey.old/debian/control 2011-02-13 11:18:29.483538793 +0100 +++ prey/debian/control 2011-02-21 19:16:40.682818251 +0100 @@ -26,10 +26,9 @@ Recommends: python (>= 2.5), python-gtk2 Description: utility for tracking stolen computers - Prey is a lightweight program that will help you track and find your laptop if - it ever gets stolen. + Prey is a lightweight program to help track and recover a stolen laptop. . - Prey comprises a shell script which calls out on a regular basis to - either a server run by prey project, or a url nominated by the system - administrator. A graphical configuration tool is also provided which is - used to maintain the simple config file. + It comprises a shell script which calls out on a regular basis to + either a server run by the Prey project, or a URL defined by the system + administrator. A graphical configuration tool is also provided in + order to maintain the simple config file.

