commit 44c7ae9e0660cb7dfe1082a6515129c220d5c9a7
Author: emma peel <[email protected]>
Date: Mon Nov 19 11:21:47 2018 +0000
add Arabic glossary from transifex
---
glossary_ar.csv | 2207 +++++++++++++++++++++++++++++++++++++++++++++++++++++++
1 file changed, 2207 insertions(+)
diff --git a/glossary_ar.csv b/glossary_ar.csv
new file mode 100644
index 0000000..69d3750
--- /dev/null
+++ b/glossary_ar.csv
@@ -0,0 +1,2207 @@
+term,pos,comment,translation_ar,comment_ar
+ donation process,,,,
+ testing,,,,
+ third-party,,,,
+!,Conjunction,"Punctuation, not a conjunction, however âpunctionationâ is
not an option in Transifex",,
+"""",Conjunction,"Punctuation, not a conjunction, however âpunctionationâ
is not an option in Transifex","""",""""
+$,,,,
+$,Conjunction,,,
+%s,Conjunction,Do not translate or change. This is a placeholder (ex: 2%s or
1%s),,
+ ,Conjunction,"&_nbsp_; [without underscores, Non-Breaking Space]",,
+...,,,,
+...,Conjunction,,,
+24/7,Noun,"Twenty-four hours, seven days a week. This essentially means ""all
the time"" (non stop). Ex: The store is open 24/7 = The store is always open.
The application runs 24/7 = The application is always running.",٢٤\٧,
+2FA,Noun,"Two-factor authentication
+Two-factor authentication
+""Something you know, and something you have."" Login systems that require
only a username and password risk being broken when someone else can obtain (or
guess) those pieces of information. Services that offer two-factor
authentication also require you to provide a separate confirmation that you are
who you say you are. The second factor could be a one-off secret code, a number
generated by a program running on a mobile device, or a device that you carry
and that you can use to confirm who you are. Companies like banks, and major
internet services like Google, Paypal and Twitter now offer two-factor
authentication.
+Synonyms: two-step verification, multi-factor authentication.
+Source EFF.",,
+3D bar chart,Noun,[Martus],Ù
خطط بأعÙ
دة Ø«ÙØ§Ø«ÙØ© Ø§ÙØ£Ø¨Ø¹Ø§Ø¯,
+3rd party,Adjective,[Signal] As in âUse a 3rd party application.â,,
+:,Conjunction,"Punctuation, not a conjunction, however âpunctionationâ is
not an option in Transifex",,
+;,Conjunction,"Punctuation, not a conjunction, however âpunctionationâ is
not an option in Transifex",,
+?,Conjunction,"Punctuation, not a conjunction, however âpunctionationâ is
not an option in Transifex",,
+A reasonably secure operating system,Noun,[Qubes OS] This is the Qubes OS
tagline.,ÙØ¸Ø§Ù
تشغÙ٠آÙ
٠بشÙÙ Ù
عÙÙÙ,
+A security-oriented operating system,Noun,[Qubes OS],ÙØ¸Ø§Ù
تشغÙÙ Ù
عÙÙ Ø¨Ø§ÙØ£Ù
Ù,
+ADIDS,Noun,what is that?,,
+API,Noun,"Application Programming Interface: ""In computer programming, an
application programming interface (API) is a set of subroutine definitions,
protocols, and tools for building application software."" -
Wikipedia",,"ÙØ§Ø¬ÙØ© برÙ
جة Ø§ÙØªØ·Ø¨ÙÙØ§Øª: "" ÙØµÙÙ
Ø§ÙØ¹Ùاصر Ø§ÙØ¨Ø±Ù
جÙÙØ© ØØ³Ø¨ ÙØ¸Ø§Ø¦ÙÙØ§Ø Ù Ù
Ø¯Ø®ÙØ§ØªÙا
Ù Ù
Ø®Ø±Ø¬Ø§ØªÙØ§. اÙÙØ¯Ù Ø§ÙØ±Ø¦ÙسÙÙ Ù
ÙÙØ§ تÙÙÙØ± ÙØ§Ø¦Ù
Ø©
Ù
٠اÙÙØ¸Ø§Ø¦Ù اÙÙ
ستÙÙÙØ© تÙ
اÙ
Ø§Ù Ø¹Ù Ø§ÙØ¢ÙÙØ© Ø§ÙØªÙ
ÙÙÙØ°Øª Ø¨ÙØ§Ø ÙØªØªÙØ ÙÙØ¢Ø®Ø±ÙÙ Ø§ÙØªÙاص٠Ù
Ø¹ÙØ§ Ù
Ù
Ø®ÙØ§Ù Ø£Ù٠آÙÙØ© أخرÙ."" - ÙÙÙÙØ¨ÙØ¯ÙØ§"
+APK,Noun,"""Android application package (APK) is the package file format used
to distribute and install application software and middleware onto Google's
Android operating system and sometimes on the BlackBerry OS 10.""
https://en.wikipedia.org/wiki/Android_application_package",APK,"""ØØ²Ù
Ø©
Ø¨Ø±ÙØ§Ù
ج Ø¢ÙØ¯Ø±ÙÙØ¯ (APK) ÙÙ ØµÙØºØ© اÙÙ
ÙÙ Ø§ÙØ°Ù ÙÙØ³ØªØ¹Ù
Ù ÙÙ ÙØ´Ø± ÙØªØ«Ø¨Ùت Ø§ÙØ¨Ø±Ø§Ù
ج Ø§ÙØ®Ø§ØµØ© Ø¨ÙØ¸Ø§Ù
Ø£ÙØ¯Ø±ÙÙØ¯."" - ÙÙÙÙØ¨ÙØ¯ÙØ§"
+About,Noun,,,
+Alice,,[Briar],,
+Alice,Noun,[Briar],,
+American Apparel,,,,
+American Apparel,Noun,,,
+Android,Noun,[Signal] [Orbot] Operating system,,
+Anti Evil Maid,Noun,[Qubes OS] Do not translate. Anti Evil Maid is an
implementation of a TPM-based static trusted boot with a primary goal to
prevent Evil Maid attacks. (Source:
https://theinvisiblethings.blogspot.com/2011/09/anti-evil-maid.html),Ù
ÙØ§ÙØØ© Ø§ÙØ®Ø§Ø¯Ù
Ø© Ø§ÙØ´Ø±Ùرة,Ù٠تÙÙÙØ© ÙÙ
ÙØ§ÙØØ© ÙØ¬ÙÙ
Ø§ÙØ®Ø§Ø¯Ù
Ø© Ø§ÙØ´Ø±Ùرة عÙÙ Ø§ÙØ£Ø¬Ùزة اÙÙ
Ø´ÙØ±Ø©
Ø¨ÙØ§Ø³Ø·Ø© TrueCrypt.
+App Store,Noun,Apple App Store [Signal],,
+AppVM,Noun,"[Qubes OS] ""Application Virtual Machine""A VM which is intended
for running software applications.",ÙØØ¯Ø© Ø§ÙØªØ·Ø¨ÙÙØ§Øª,
+Apt.,,,,
+Apt.,Noun,,,
+Ativistas,,,,
+Ativistas,Noun,,,
+Autocrypt Setup Message,Noun,[Enigmail] [OpenKeychain],,
+Autonomous System number,Noun,,,
+BCC,Noun,"""Blind carbon copy""",,
+Back,Adverb,,,
+Back to,,,,
+Back to,Adverb,,,
+Backup Key File,Noun,[Martus] Also: key backup,Ù
Ù٠اÙÙ
ÙØªØ§Ø
Ø§ÙØ§ØØªÙاطÙ,
+Benetech,Noun,Company name which should not be translated or transcribed.,,
+BitTorrent,,,,
+BitTorrent,Noun,,,
+Bitcoin,,,,
+Bitcoin,Noun,,,
+Blow the Whistle,Noun,[Globaleaks],,
+Blow the Whistle,Verb,[Globaleaks] GlobaLeaks catch phrase,اÙÙØ® ØµÙØ§Ø±Ø©
Ø§ÙØ¥Ùذار,
+Bob,,[Briar],,
+Bob,Noun,[Briar],,
+Bug,,,,
+C&C,Noun,"A command and control server (C&C or C2) is a computer that gives
orders to malware-infected devices and receives information from those devices.
Some C&C servers control millions of devices.
+Synonyms: Command and control server, C2.
+Source EFF.",,
+C2,Noun,"A command and control server (C&C or C2) is a computer that gives
orders to malware-infected devices and receives information from those devices.
Some C&C servers control millions of devices.
+Synonyms: Command and control server, C2.
+Source EFF.",,
+CFC program,,,,
+CFC program,Noun,,,
+CIDR,Noun,Classless inter-domain routing,,
+CPU,Noun,,ÙØØ¯Ø© اÙÙ
Ø¹Ø§ÙØ¬Ø© اÙÙ
Ø±ÙØ²ÙØ©,
+CSR,Noun,Certificate Signing Request,,
+CSRF,Noun,,,
+CVC,,,,
+CVC,Noun,,,
+Cancel,Verb,,,
+Card Number,,,,
+Carol,,[Briar],,
+Carol,Noun,[Briar],,
+Certificate Signing Request,Noun,,,
+ChatSecure,Noun,Application Name,,
+Chrome App,Noun,[Signal],,
+Chrome OS,Noun,,,
+Chrome Web Store,Noun,,سÙÙ ÙÙØ±ÙÙÙ
Ù Ø§ÙØ§ÙÙØªØ±ÙÙÙ,
+Circuit Display,Noun,[Tor],,
+Clear,Noun,,,
+Clearnet,Noun,,Ø§ÙØ§ÙØªØ±ÙØª اÙÙ
ÙØ´ÙÙ,
+Client User Interface,Noun,,ÙØ§Ø¬ÙØ© اÙÙ
ستخدÙ
ÙÙØ¹Ù
ÙÙ,
+ClockVM,Noun,,,
+Combined Federal Campaign,,,,
+Combined Federal Campaign,Noun,,,
+Command-line tool,Noun,"The ""command line"" is an ancient way of giving a
computer a series of small, self-contained orders (think of those science
fiction movies where teenage geniuses type long strings of green text onto
black screens). To use a command line tool, the user types a command into a
window called a terminal emulator, hits the return or enter key, and then
receives a textual response in the same window. Windows, Linux and Apple
desktop computers still let you run software using this interface, and even
some mobile phones can do the same with the right app. The command line can be
used to run software pre-packaged with your operating system. Some downloadable
programs, especially technical utilities, use the command line instead of a
more familiar ""icons and buttons"" user interface. The command line needn't be
scary, but it does require you to type in exactly the right set of letters and
numbers to get the correct result, and it's often unclear what to do if the resp
onses don't match your expectations.
+Source EFF.",أداة سطر Ø£ÙØ§Ù
ر,"Ø¥Ù ""سطر Ø§ÙØ£ÙاÙ
ر""
طرÙÙØ© ÙØ¯ÙÙ
Ø© Ø¬Ø¯Ø§Ù ÙØ¥Ø¹Ø·Ø§Ø¡ اÙÙÙ
بÙÙØªØ± Ø³ÙØ³ÙØ© Ù
Ù
Ø§ÙØ£ÙاÙ
ر Ø§ÙØµØºÙرة اÙÙ
ØØªÙاة (ÙÙØ± بأÙÙØ§Ù
Ø§ÙØ®ÙØ§Ù Ø§ÙØ¹ÙÙ
Ù ÙØ§Ùت٠تعرض Ù
راÙÙÙÙ Ø¹Ø¨ÙØ±ÙÙÙ
ÙØ¯Ø®ÙÙÙ Ø³ÙØ§Ø³Ù Ù
٠اÙÙØµ بÙÙ٠أخضر عÙÙ Ø®ÙÙÙØ©
Ø³ÙØ¯Ø§Ø¡). ÙØ§Ø³ØªØ®Ø¯Ø§Ù
سطر Ø§ÙØ£ÙاÙ
Ø±Ø ÙÙØªØ¨ اÙÙ
ستخدÙ
Ø£Ù
را٠ÙÙ ÙØ§Ùذة تدع٠terminal emulator ÙÙØ¶ØºØ· زر
Ø§ÙØ¥Ø¯Ø®Ø§Ù ÙÙ
Ù Ø«Ù
ÙØØµÙ Ø¹Ù٠رد ÙØµÙ ضÙ
٠اÙÙØ§Ùذة
ÙÙØ³Ùا. ÙØ§ تزا٠اÙÙÙ
بÙÙØªØ±Ø§Øª Ø§ÙØ¹Ø§Ù
ÙØ© Ø¨ÙØ¸Ù
تشغÙÙ ÙÙÙÙÙØ³ ÙÙ
ا٠ÙÙÙÙØ¯Ùز تسÙ
Ø Ù٠بتشغÙÙ
Ø§ÙØ¨Ø±Ø§Ù
ج باستخداÙ
ÙØ°Ù اÙÙØ§Ø¬ÙØ©Ø ÙØØªÙ Ø¨Ø¹Ø¶
اÙÙÙØ§ØªÙ Ø§ÙØ°ÙÙØ© ÙÙ
ÙÙÙØ§ اÙÙÙØ§Ù
بذÙ٠باستخداÙ
Ø§ÙØªØ·Ø¨Ù٠اÙÙ
ÙØ§Ø³Ø¨. ÙÙ
Ù٠استخداÙ
سطر Ø§ÙØ£ÙاÙ
ر
ÙØªØ´ØºÙ٠برÙ
Ø¬ÙØ
§Øª Ù
ÙØ¬Ùدة Ù
Ø³Ø¨ÙØ§Ù ضÙ
Ù ÙØ¸Ø§Ù
Ø§ÙØªØ´ØºÙÙ. ÙØªØ³ØªØ®Ø¯Ù
بعض Ø§ÙØ¨Ø±Ø§Ù
ج Ø§ÙØªÙ ÙÙ
ÙÙ ØªÙØ²ÙÙÙØ§ - Ø®ØµÙØµØ§Ù براÙ
ج Ø§ÙØ£Ø¯Ùات Ø§ÙØªÙÙÙØ© - سطر Ø§ÙØ£ÙاÙ
ر Ø¹ÙØ¶Ø§Ù عÙ
ÙØ§Ø¬ÙØ© تعتÙ
د ""Ø§ÙØ£ÙÙÙÙØ§Øª ÙØ§Ùأزرار"" اÙÙ
Ø£ÙÙÙØ©
بشÙÙ Ø£ÙØ¨Ø± ÙÙÙ
ستخدÙ
ÙÙ. ÙØ§ داع٠ÙÙØ®ÙÙ Ù
٠سطر
Ø§ÙØ£ÙاÙ
Ø±Ø ÙÙÙÙÙ ÙØªØ·Ùب Ù
ÙÙ Ø¥Ø¯Ø®Ø§Ù Ø³ÙØ³Ø© Ø§ÙØ£ØØ±Ù
ÙØ§ÙØ£Ø±ÙØ§Ù
Ø¨Ø¯ÙØ© Ù
Ø·ÙÙØ© ÙÙØØµÙ٠عÙ٠اÙÙØªÙجة
Ø§ÙØµØÙØØ©Ø ÙØºØ§Ùبا٠Ù
ا ÙØ§ ÙÙÙÙ ÙØ§Ø¶ØØ§Ù Ù
ا ÙØªÙجب
ÙØ¹ÙÙ Ø¹ÙØ¯Ù
ا تÙÙÙ Ø§ÙØ±Ø¯Ùد ÙØ§ تطاب٠تÙÙØ¹Ø§ØªÙ."
+Comments,,,,
+Commit,Noun,,,
+Commit,Verb,,,
+Company,,,,
+Company,Noun,,,
+Configuring,,,,
+Contributions,,,,
+Contributors,Noun,,,
+Core,,,,
+Core,Noun,,,
+Courier,Noun,"App name. Do not translate the app name. If necessary,
transcribe the name into translation language and place in parentheses after
the original name. Ex: Courier (ÙÙØ±ÙÙØ±)",,
+"Credit Card, credit card",,,,
+"Credit Card, credit card",Noun,,,
+Cross-site scripting,Noun,,,
+Crowdfunding,,,,
+Crowdfunding,Noun,,,
+Crypto,Adjective,,,
+Crypto,Noun,This is an abbreviation of âcryptography.â,,
+Customization Template Files (*.mct),Noun,[Martus],Ù
ÙÙØ§Øª ØªØ®ØµÙØµØ§Øª
اÙÙÙØ§Ùب (*.mct),
+DD,Noun,,,
+DDoS,Noun,"A method for taking a website or other Internet service offline, by
co-ordinating many different computers to request or send data to it
simultaneously. Usually the computers used to conduct such an attack are
remotely controlled by criminals, who have taken over the machines by breaking
into them, or infecting them with malware.
+Synonyms: distributed denial of service
+Source EFF",,
+DDoS (distributed denial of service),Noun,"A method for taking a website or
other Internet service offline, by co-ordinating many different computers to
request or send data to it simultaneously. Usually the computers used to
conduct such an attack are remotely controlled by criminals, who have taken
over the machines by breaking into them, or infecting them with malware.
(Synonyms: DDoS) (Source EFF)",ÙØ¬ÙÙ
Ø§ÙØØ±Ù
ا٠Ù
Ù Ø§ÙØ®Ø¯Ù
Ø©,
+DHT,Noun,,,
+DNS,Noun,Domain Name Server,,
+DNS record,Noun,,,
+DVM,Noun,"[Qubes] An abbreviation of DispVM, typically used to refer to DVM
Templates.",,
+DVM Template,Noun,[Qubes] TemplateBasedVMs on which DispVMs are based.,,
+Darknet,Noun,,Ø§ÙØ¥ÙØªØ±ÙØª اÙÙ
ظÙÙ
,
+Data Retention Strategy,Noun,,,
+Data Source Grid,Noun,,جدÙÙ Ù
صدر Ø§ÙØ¨ÙØ§ÙØ§Øª,
+Data-Driven Dropdown (Field),Noun,[Matus],,
+Date,Noun,,,
+Debian-based Linux,Noun,[Signal],,
+Deflect,Noun,Don't translate this,,
+Desktop Client,Noun,,Ø³Ø·Ø Ù
ÙØªØ¨ Ø§ÙØ¹Ù
ÙÙ,
+Device Management,Noun,,إدارة Ø§ÙØ£Ø¬Ùزة,
+Devtools,Noun,,,
+Disconnect,Verb,Disconnect search service,,
+Disconnect ,,Disconnect search service,,
+DispVM,Noun,"[QubesOS] ""Disposable Virtual Machine""A temporary AppVM based
on a DVM Template which can quickly be created, used, and destroyed.",,
+Distributed,Verb,,ÙØ²Ø¹,
+Distribution,Noun,,Ø§ÙØªÙØ²ÙØ¹Ø©,
+Divice Management,Noun,,,
+Dom0,Noun,"[QubesOS] ""Domain Zero"" Also known as the **host** domain, dom0
is the initial VM started by the Xen hypervisor on boot.",,
+DomU,Noun,"[QubesOS] ""Unprivileged Domain""Also known as **guest** domains,
domUs are the counterparts to dom0.",,
+Donate,,,,
+Donate Page,,,,
+Donor (n),Noun,,,
+Double-check,Verb,[Signal],,
+Download,Verb,,,
+Downloading,,,,
+Downloads,Noun,,,
+Drag and Drop,Noun,,Ø§ÙØ³ØØ¨ ÙØ§ÙØ¥ÙÙØ§Øª,
+Drawer,Noun,"A UI design pattern that consist on a lateral, hidden menu that
can be brought into view usually by tapping an ""hamburguer"" icon or swiping
from the left.",,
+DuckDuckGo,Noun,Name of an open source search engine.,,
+Dump,Noun,,,
+Dump,Verb,,,
+EPUB Reader,Noun,,,
+Eavesdropping,Noun,,,
+Edge,Noun,,,
+Edge server,Noun,,,
+Email Subject,Noun,[Globaleaks],,
+Encrypted,Verb,[Globaleaks],Ù
Ø´ÙÙØ±,
+Ensure,Verb,,ØªØ£ÙØ¯,
+Enter,,,,
+Event,Noun,,ØØ§ÙØ©,
+External drive,Noun,,,
+Extra text,Noun,,ÙØµ زائد,
+FAI satellite,Noun,,,
+FAQ,Noun,[Orbot] âFrequently Asked Questionsâ,Ø§ÙØ£Ø³Ø¦ÙØ©
Ø§ÙØ´Ø§Ø¦Ø¹Ø©,
+FOSS,Noun,Free and open-source software,,
+FTP (File Transfer Protocol),Noun,"An old method for copying files from a
local computer to a remote one, or vice versa. The job of FTP programs (and the
FTP servers that stored the files) have mostly been replaced by web browsers
and web servers, or file synchronising programs like Dropbox.
+Synonyms: FTP server, File Transfer Protocol. (Source: EFF)",Ø¨Ø±ÙØªÙÙÙÙ
ÙÙ٠اÙÙ
ÙÙØ§Øª (FTP),"""أسÙÙØ¨ ÙØ¯ÙÙ
ÙÙØ³Ø® اÙÙ
ÙÙØ§Øª Ù
Ù
ÙÙ
بÙÙØªØ± Ù
ØÙ٠إÙ٠آخر Ø¨Ø¹ÙØ¯Ø Ø£Ù Ø¨Ø§ÙØ¹Ùس. Ù
ÙÙ
Ø©
براÙ
ج FTP (ÙØ³ÙØ±ÙØ±Ø§Øª FTP Ø§ÙØªÙ ØªØ®Ø²Ù Ø§ÙØ¨ÙØ§ÙØ§Øª)
Ø§Ø³ØªØ¨Ø¯ÙØªÙا اÙÙ
ØªØµÙØØ§Øª ÙÙ
خدÙ
ات اÙÙÙØ¨Ø أ٠خدÙ
ات Ù
زاÙ
ÙØ© اÙÙ
ÙÙØ§Øª Ù
ث٠Dropbox."" (EFF)"
+FTP server,Noun,"An old method for copying files from a local computer to a
remote one, or vice versa. The job of FTP programs (and the FTP servers that
stored the files) have mostly been replaced by web browsers and web servers, or
file synchronising programs like Dropbox. (Synonyms: FTP server, File Transfer
Protocol) (Source EFF)",,
+Face ID,Noun,[Signal] Specific to iOS,,
+Fallback,Adjective,[Globaleaks],,
+Fallback,Noun,[Orbot] [Globaleaks],,
+Favicon,Noun,"A favicon, also known as a shortcut icon, website icon, tab
icon, URL icon, or bookmark icon, is a file containing one or more small icons,
associated with a particular website or web page.",,
+Feedback,Noun,,,
+File fingerprint,Noun,"A sequence or letters or numbers that represent the
contents of a file. Changing the file even a tiny bit will completely change
its fingerprint. Checking the fingerprint of a file that you've downloaded,
such as a software application or extension, helps to make sure that you got
the same file that other people have, and that nobody has tampered with it
while it was being downloaded.
+Synonyms: file hash value.
+Source EFF.",بصÙ
Ø©,"""تتÙÙÙ Ù
ÙØ§ØªÙØ Ø§ÙØªØ´ÙÙØ± باÙÙ
ÙØªØ§Ø Ø§ÙØ¹Ù
ÙÙ
Ù Ù
Ù Ø£Ø±ÙØ§Ù
ÙØ¨Ùرة Ø¬Ø¯Ø§ÙØ ÙØªØ¬Ø§Ùز
Ø·ÙÙÙØ§ Ø£ØÙØ§ÙØ§Ù Ø£Ù٠رÙÙ
Ø£Ù Ø£ÙØ«Ø±. Ø§ÙØ¨ØµÙ
Ø© Ù٠رÙÙ
أصغر Ø¨ÙØ«Ùر Ø£Ù Ù
جÙ
ÙØ¹Ø© Ù
Ù Ø§ÙØ£Ø±ÙاÙ
ÙØ§ÙØ£ØØ±Ù
Ø§ÙØªÙ ÙÙ
Ù٠استخداÙ
ÙØ§ ÙØ§Ø³Ù
ÙØ±Ùد ÙØ°Ù٠اÙÙ
ÙØªØ§ØØ دÙÙ Ø§ÙØØ§Ø¬Ø© ÙØ³Ø±Ø¯ ÙØ§ÙØ© Ø§ÙØ£Ø±ÙاÙ
. ÙØ¹ÙÙ
سبÙ٠اÙÙ
Ø«Ø§ÙØ إذا ÙÙØª ترغب Ø¨Ø§ÙØªØ£Ùد Ù
ع صدÙÙÙ Ù
٠استخداÙ
ÙÙ
ا ÙÙÙØ³ اÙÙ
ÙØªØ§ØØ ÙÙ
ÙÙÙÙ
ا Ø¥Ù
ا Ø£Ù
ØªÙØ¶Ùا ÙÙØªØ§Ù Ø·ÙÙÙØ§Ù ÙÙØ±Ø§Ø¡Ø© اÙÙ
ئات Ù
Ù Ø§ÙØ£Ø±ÙاÙ
Ø§ÙØªÙ تÙÙÙ٠اÙÙ
ÙØªØ§ØØ إ٠بإÙ
ÙØ§Ù ÙÙ Ù
ÙÙÙ
ا Ø£Ù
ÙÙÙÙ
Ø¨ØØ³Ø§Ø¨ بصÙ
Ø© Ù
ÙØªØ§ØÙ ÙÙ
ÙØ§Ø±ÙØªÙØ§ Ø¹ÙØ¶Ø§Ù عÙ
ذÙÙ. عادة Ù
ا تتأÙÙ Ø§ÙØ¨ØµÙ
ات Ø§ÙØªÙ ØªÙØ¯Ù
ÙØ§ براÙ
ج Ø§ÙØªØ´ÙÙØ± Ù
Ù ØÙاÙÙ 40 ØØ±ÙØ§Ù ÙØ±ÙÙ
اÙ. إذا ØªÙØØµØª
بص
Ù
Ø© Ø¨Ø¹ÙØ§ÙØ© ÙÙØªØ£Ùد Ù
Ù Ø§ØØªÙØ§Ø¦ÙØ§ اÙÙÙÙ
Ø©
Ø§ÙØµØÙØØ©Ø ستÙÙ٠آÙ
ÙØ§Ù Ù
Ù Ø§ÙØªØØ§Ù Ø§ÙØ´Ø®ØµÙØ© بÙ
ÙØªØ§Ø Ù
زÙÙ. ÙØ¯ ØªÙØ¯Ù
بعض Ø§ÙØ£Ø¯Ùات Ø§ÙØ¨Ø±Ù
Ø¬ÙØ©
Ø·Ø±ÙØ§Ù بدÙÙØ© Ø£ÙØ«Ø± سÙÙÙØ© ÙÙØªØÙÙ Ù
Ù Ù
ÙØªØ§Ø Ø£ØØ¯
Ø§ÙØ£ØµØ¯ÙØ§Ø¡Ø ÙÙÙÙ Ù
٠اÙÙ
ÙÙ
إجراء Ø§ÙØªØÙ٠بشÙÙ Ù
ا ÙÙ
ÙØ¹ Ù
ÙØ¯Ù
٠خدÙ
ات Ø§ÙØ§ØªØµØ§Ùات Ù
Ù Ø§ÙØªÙصت
بسÙÙÙØ©."" (EFF)"
+File hash value,Noun,"A sequence or letters or numbers that represent the
contents of a file. Changing the file even a tiny bit will completely change
its fingerprint. Checking the fingerprint of a file that you've downloaded,
such as a software application or extension, helps to make sure that you got
the same file that other people have, and that nobody has tampered with it
while it was being downloaded.
+Synonyms: File fingerprint.
+Source EFF.",,
+File system,Noun,"Where data is stored, usually locally, on your computer or
other device. File systems are usually where personal documents and notes are
stored for easy access.
+Source EFF.",,
+Firefox,Noun,,ÙÙÙÙØ±ÙÙÙÙÙØ³Ù,
+Firewall,Noun,"A tool that protects a computer from unwanted connections to or
from local networks and the Internet. A firewall might have rules that forbid
outgoing email, or connections to certain websites. Firewalls can be used as a
first line of defense to protect a device from unexpected interference. Or they
can be used to prevent users from using the Internet in certain ways. (Source:
EFF)",جدار Ø§ÙØÙ
Ø§ÙØ©,
+FirewallVM,Noun,"[Qubes] ""Firewall Virtual Machine""A type of ProxyVM which
is used to enforce network-level policies (a.k.a. ""firewall rules"").",,
+Firewalled,Adjective,,,
+Firmware,Noun,,,
+Fit,,,,
+Folder Options,Noun,,,
+Form,Noun,,استÙ
ارة,
+Form 990,,,,
+Forward Secrecy,Noun,"A property of a secure messaging system which ensures
that your past communications can remain secure even if one of the private keys
is stolen later. For HTTPS websites, forward secrecy is an important protection
against adversaries like intelligence agencies which may record large amounts
of traffic and use a stolen key to decrypt it. For messaging and chat systems,
forward secrecy is necessary to ensure that deleted messages are really
deleted, but you will also need to either disable logging or securely delete
past messages.
+Synonyms: Perfect forward secrecy.
+Source EFF.",,
+Frequently Asked Questions,Noun,âFAQâ,,
+Full disk encryption,Noun,"If you're planning on securing data on your local
device, you could choose to just encrypt a few key files, or you could encrypt
everything on the computer. âFull disk encryptionâ is the term for
encrypting everything. It's usually safer (and often easier) to use full disk
encryption than to manage just a few individually encrypted files. If you try
to encrypt just individual files, your computer might make temporary
unencrypted copies of those files without you noticing. And some software might
keep some unencrypted records about your use of your computer. Apple's OS X,
Linux and high-end versions of Windows all have built-in full disk encryption,
but it is usually not turned on by default.
+Source EFF.",تعÙ
ÙØ© ÙØ±Øµ بأÙÙ
ÙÙ,"""إذا ÙÙØª تخطط ÙØÙ
Ø§ÙØ© Ø§ÙØ¨ÙØ§ÙØ§Øª عÙÙ Ø¬ÙØ§Ø²Ù اÙÙ
ØÙÙØ ÙÙ
ÙÙ٠أÙ
تختار تشÙÙØ± بضعة Ù
ÙÙØ§Øª ÙØ§Ù
Ø© ÙÙØ·Ø أ٠تشÙÙØ±
ÙÙ Ø´ÙØ¡ عÙÙ Ø§ÙØ¬Ùاز. ""تشÙÙØ± اÙÙØ±Øµ بأÙÙ
ÙÙ"" Ù
ØµØ·ÙØ ÙØªØ´ÙÙØ± ÙÙ Ø´ÙØ¡. عادة تشÙÙØ± اÙÙØ±Øµ بأÙÙ
ÙÙ
Ø£ÙØ«Ø± Ø£Ù
ÙØ§Ù (ÙØ³ÙÙÙØ©) Ù
٠إدارة بضعة Ù
ÙÙØ§Øª Ù
Ø´ÙØ±Ø© ÙÙØ·. إذا جربت تشÙÙØ± بضعة Ù
ÙÙØ§ØªØ ÙØ¯ ÙØÙÙ
Ø¬ÙØ§Ø²Ù ÙØ³Ø®Ø§Ù Ù
Ø¤ÙØªØ© ØºÙØ± Ù
Ø´ÙØ±Ø© Ù
٠تÙ٠اÙÙ
ÙÙØ§Øª
دÙ٠أ٠تدرÙ. ÙÙØ¯ ØªØØªÙظ بعض Ø§ÙØ¨Ø±Ø§Ù
ج Ø¨Ø³Ø¬ÙØ§Øª
ØºÙØ± Ù
Ø´ÙØ±Ø© ØÙ٠استخداÙ
Ù ÙÙÙÙ
بÙÙØªØ±. Ù
ا٠OS X
ÙÙÙÙÙÙØ³ ÙØ§ÙÙØ³Ø® Ø§ÙØ§ØØªØ±Ø§ÙÙØ© Ù
Ù ÙÙÙØ¯Ùز تØÙ٠جÙ
ÙØ¹Ø§Ù تشÙÙØ± اÙÙØ±Øµ ÙØ§Ù
ÙØ§Ù بشÙÙ Ù
دÙ
Ø¬Ø ÙÙÙ٠اÙÙ
ÙØ²Ø© ØºÙØ± Ù
ÙØ¹ÙØ© بشÙÙ Ø§ÙØªØ±Ø§Ø¶Ù."" (EFF)"
+Fully Qualified Domain Name,Noun,See
https://en.wikipedia.org/wiki/Fully_qualified_domain_name,,
+Functionality,Noun,,,
+GC,Noun,Garbage collector,,
+GDPR,Noun,"Synonym: GDPR
+https://ec.europa.eu/commission/priorities/justice-and-fundamental-rights/data-protection/2018-reform-eu-data-protection-rules_en",,
+GFW,Noun,,,
+GIF,Noun,Graphics Interchange Format [Signal],,
+GNU General Public License,Noun,,,
+GPG,Noun,"""Gnu Privacy Guard"" GPG is a free software that implements OpenPGP
specification",,
+Garbage data,Noun,,,
+Garlic,Noun,https://en.wikipedia.org/wiki/Garlic_routing,,
+Garlic routing,Noun,https://en.wikipedia.org/wiki/Garlic_routing,,
+General Data Protection Regulation,Noun,"Synonym: GDPR
+https://ec.europa.eu/commission/priorities/justice-and-fundamental-rights/data-protection/2018-reform-eu-data-protection-rules_en",,
+Get,,,,
+Get Access Mode,Noun,[Lantern],,
+GetTor,Noun,[Orbot] [Tor],,
+Getting Started,Noun,,,
+Ghost,Noun,"[Peerio] ""Ghost"" is used as a proper noun in Peerio for a
feature that allows users to send messages and files to a non-Peerio user via
email or URL. This URL can be accessed with a secret passphrase and decrypted
in the browser.
+
+""I sent you a (Peerio) Ghost""",,
+Giant Rabbit,,,,
+Give Access Mode,Noun,[Lantern],,
+GlobaLeaks,Noun,[Globaleaks] Name of application. Do not translate.,,
+Glossary,Noun,,,
+Go Back,Verb,,,
+Google,Verb,Company Name (Reference Google.com for appropriate transcription
if applicable),,
+Google Captcha,Noun,,,
+Google Chrome,Noun,,Ø¬ÙØ¬Ù ÙÙØ±ÙÙÙ
Ù,
+Google Drive,Noun,,,
+Google Play Store,Noun,[Signal],,
+Got Skills,,,,
+Graceful Shutdown,Noun,[I2P],,
+Gracefully,Adverb,,,
+Graph,Noun,,,
+Graph,Verb,,,
+Great Firewall of China,Noun,,,
+Grid,Noun,,Ø´Ø¨ÙØ©,
+Guardian Project,Noun,,,
+HQ,Noun,,,
+HRD,Noun,Human Rights Defence,,
+HTTP,Noun,"[Orbot] ""The Hypertext Transfer Protocol (HTTP) is an application
protocol for distributed, collaborative, and hypermedia information systems.
HTTP is the foundation of data communication for the World Wide Web."" -
Wikipedia (https://en.wikipedia.org/wiki/Hypertext_Transfer_Protocol)",,
+HTTP Header Field Manipulation,Noun,,,
+HTTP Invalid Request Line,Noun,,,
+HTTPS,Noun,"""HTTPS (also called HTTP over Transport Layer Security [TLS],
HTTP over SSL, and HTTP Secure) is a communications protocol for secure
communication over a computer network which is widely used on the Internet.
HTTPS consists of communication over Hypertext Transfer Protocol (HTTP) within
a connection encrypted by Transport Layer Security, or its predecessor, Secure
Sockets Layer. The main motivation for HTTPS is authentication of the visited
website and protection of the privacy and integrity of the exchanged data."" -
Wikipedia (https://en.wikipedia.org/wiki/HTTPS)",HTTPS,"""إذا Ø±Ø£ÙØª
عÙÙØ§Ù Ù
ÙÙØ¹ Ù
ÙØªÙبا٠بشÙÙ ÙØ§Ù
Ù Ù
Ø«Ù
âhttp://www.example.com/â ÙØ¨Ùا ش٠ستÙ
ÙØ² جزء âhttpâ Ù
ÙÙ. HTTP Ø£Ù (hypertext transfer protocol) ""Ø¨Ø±ÙØªÙÙÙÙ ÙÙÙ
اÙÙØµ اÙÙØ§Ø¦Ù"" ÙÙ Ø§ÙØ·Ø±ÙÙØ© Ø§ÙØªÙ ÙØªØØ¯Ø« Ø¨ÙØ§ Ù
ØªØµÙØ Ø§ÙØ¥ÙØªØ±ÙØª عÙÙ Ø¬ÙØ§Ø²Ù Ù
ع Ù
خدÙ
ÙÙØ¨ Ø¨Ø¹ÙØ¯.
ÙÙØ£Ø³ÙØ ÙØ±Ø³Ù http اÙ
عاد٠اÙÙØµ بشÙÙ ØºÙØ± Ø¢Ù
٠عبر Ø§ÙØ¥ÙØªØ±ÙØª. ÙØ³ØªØ®Ø¯Ù
HTTPS (ØÙØ« S ØªØ´ÙØ± ÙÙSecure Ø£Ù ""Ø¢Ù
Ù"") Ø§ÙØªØ´ÙÙØ± ÙØÙ
Ø§ÙØ© Ø§ÙØ¨ÙØ§ÙØ§Øª Ø§ÙØªÙ ترسÙÙØ§ ÙÙ
ÙØ§Ùع Ø§ÙØ¥ÙØªØ±ÙØª
ÙØ§ÙØ¨ÙØ§Ùات ترسÙÙØ§ Ù٠بشÙÙ Ø£ÙØ¶Ù Ù
٠عÙÙ٠اÙÙ
ØªÙØµØµÙÙ."" (SSD)"
+HTTPS Everywhere,Noun,,HTTPS ÙÙ ÙÙ Ù
ÙØ§Ù,
+HTTPS certificate,Noun,,,
+HVM,Noun,"[Qubes] ""Hardware Virtual Machine""Any fully virtualized, or
hardware-assisted, VM utilizing the virtualization extensions of the host
CPU.",,
+Hardcoded,Verb,,,
+Hardware,Noun,,عتاد,
+Headline,Noun,,,
+Heart of Internet Freedom,,,,
+Heart of Internet Freedom T-Shirt,,,,
+Heartbeat,Noun,,,
+Help,Noun,[Orbot],,
+Hidden,Adjective,,,
+Hidden Service,Noun,[Orbot],,
+Homepage,Noun,[Globaleaks],,
+Hop,Noun,,,
+Hosting provider,Noun,,,
+Hotspot,Noun,,,
+Housekeeping,Noun,,,
+I/O,Noun,Input/ouput,,
+I2P,Noun,[I2P] Name of application. Do not translate.,,
+ID,Noun,[Mailvelope],,
+IDE,Noun,,,
+IMAP settings,Noun,"IMAP is the way that many email programs communicate with
services that send, receive and store your email. By changing the IMAP settings
on your email program, you can choose to load email from different servers or
set the level of security and encryption used to transfer the mail across the
Internet to you.
+Source EFF.",إعدادات IMAP,Ø¥Ù IMAP ÙÙ Ø§ÙØ·Ø±ÙÙØ© Ø§ÙØªÙ
ÙØªÙØ§ØµÙ Ø¨ÙØ§ Ø§ÙØ¹Ø¯Ùد Ù
٠براÙ
ج Ø§ÙØ¨Ø±Ùد
Ø§ÙØ¥ÙÙØªØ±ÙÙÙ Ù
ع اÙÙ
خدÙ
ات Ø§ÙØªÙ ØªØ±Ø³Ù ÙØªØ³ØªÙبÙ
ÙØªØ®Ø²Ù Ø§ÙØ¨Ø±Ùد Ø§ÙØ¥ÙÙØªØ±ÙÙÙ. بتغÙÙØ± إعدادات IMAP
عÙÙ Ø¨Ø±ÙØ§Ù
ج Ø§ÙØ¨Ø±Ùد Ø§ÙØ¥ÙÙØªØ±ÙÙÙ ÙÙ
ÙÙÙ Ø§Ø®ØªÙØ§Ø±
تØÙ
ÙÙ Ø§ÙØ¨Ø±Ùد Ø§ÙØ¥ÙÙØªØ±ÙÙÙ Ù
Ù Ù
خدÙ
ات Ù
ختÙÙØ©
أ٠ضبط Ù
ستÙÙ Ø§ÙØ£Ù
Ø§Ù ÙØ§ÙتشÙÙØ± اÙÙ
ستخدÙ
ÙÙÙÙ
Ø§ÙØ¨Ø±Ùد عبر Ø§ÙØ¥ÙØªØ±ÙØª Ø¥ÙÙÙ.
+IP address,Noun,"[Orbot] A device on the Internet needs its own address to
receive data, just like a home or business needs a street address to receive
physical mail. This address is its IP (Internet Protocol) address. When you
connect to a web site or other server online, you usually reveal your own IP
address. This doesn't necessarily reveal either your identity (it's hard to map
an IP address to a real address or a particular computer). An IP address can
give away some information about you, however, such as your rough location or
the name of your Internet Service Provider. Services like Tor let you hide your
IP address, which helps give you anonymity online. (Source EFF)",,
+IP addresses,Noun,,,
+ISP (Internet Service Provider),Noun,ISP,,
+Immediate,Adjective,,,
+Implement,Verb,,,
+Inbound,Adjective,,,
+Include Private Data,Verb,,,
+Indicators of compromise,Noun,"Clues that show that your device may have been
broken into or tampered with.
+Source EFF.",,
+Intermediate Certificate,Noun,,,
+Internal storage,Noun,"Non volatile memory used in devices, mobile or else.",,
+Internet,Noun,[Signal],Ø¥ÙØªØ±Ùت,
+Internet filtering,Noun,Filtering is the politer term for blocking or
censoring Internet traffic. (Synonyms: blocking) (Source: EFF),,
+Introduce,Verb,,,
+Introducer,Noun,,,
+Introduction,Noun,,,
+Invalid,,,,
+Item,Noun,,,
+JRE,Noun,Synonym: Java Runtime Environment,,
+JS,Noun,,Ø¬ÙØ§ÙÙØ§Ø³ÙÙÙØ±ÙØ¨ÙØªÙ,
+Java Runtime Environment,Noun,Synonyme : JRE,,
+Javascript,,,,
+Javascript,Noun,,Ø¬ÙØ§ÙÙØ§Ø³ÙÙÙØ±ÙØ¨ÙØªÙ,
+Join,Verb,,,
+Journalists,,,,
+KB,Noun,[Orbot] kilobyte,,
+KB/s,Noun,,,
+"KB/s, Kbps",Noun,,,
+KBps,Noun,,,
+"Kbps, KB/s",Noun,[Orbot] kilobytes per second,,
+Key,Noun,,,
+Key Backup,Noun,[Martus],Ù
Ù٠اÙÙ
ÙØªØ§Ø Ø§ÙØ§ØØªÙاطÙ,
+Key Exchange,Noun,,تباد٠اÙÙ
ÙØ§ØªÙØ,
+Key fingerprint,Noun,"A sequence of letters or numbers that represent a public
key. Some privacy tools let you check the match between someone's key
fingerprint as seen by your device and by their device. The purpose of this
check is to prevent a man-in-the-middle attack, where someone tricks you into
using the wrong key.
+Source EFF.",,
+Key verification,Noun,"In public key cryptography, each person has a set of
keys. To send a message securely to a particular person, you encrypt your
message using their public key. An attacker may be able to trick you into using
their key, which means that they will be able to read your message, instead of
the intended recipient. That means that you have to verify that a key is being
used by a particular person. Key verification is any way that lets you match a
key to a person.
+Source EFF.",ØªÙØ«Ù Ù
٠اÙÙ
ÙØ§ØªÙØ,"""Ù٠عÙÙ
تشÙÙØ± اÙÙ
ÙØ§ØªÙØ Ø§ÙØ¹ÙÙÙØ© (Ø£Ù Ø§ÙØ¹Ù
ÙÙ
ÙØ©)Ø ÙÙ٠شخص Ù
جÙ
ÙØ¹Ø©
خاصة Ù
٠اÙÙ
ÙØ§ØªÙØ. ÙØ¥Ø±Ø³Ø§Ù Ø±Ø³Ø§ÙØ© Ø¨Ø³Ø±ÙØ© ÙØ´Ø®Øµ Ù
عÙÙØ ØªØ´ÙØ± Ø±Ø³Ø§ÙØªÙ باستخداÙ
Ù
ÙØªØ§ØÙÙ
Ø§ÙØ¹ÙÙÙ.
ÙØ¯ ÙØªÙ
ÙÙ Ù
ÙØ§Ø¬Ù
Ù
Ù Ø®Ø¯Ø§Ø¹Ù ÙØ§Ø³ØªØ®Ø¯Ø§Ù
Ù
ÙØªØ§ØÙ Ù
Ù
ا
ÙØ¹Ù٠أÙ٠سÙÙØ¯Ø± عÙÙ ÙØ±Ø§Ø¡Ø© Ø±Ø³Ø§ÙØªÙ Ø¹ÙØ¶Ø§Ù ع٠اÙÙ
تÙÙ٠اÙÙ
ÙØµÙد. ÙØ°ÙÙ ÙØ¹Ù٠أÙÙ ÙØªÙجب عÙÙÙ
Ø§ÙØªØÙÙ Ù
٠أ٠اÙÙ
ÙØªØ§Ø ÙØ¹Ùد ÙÙØ´Ø®Øµ اÙÙ
Ø·ÙÙØ¨
ÙØ¹ÙاÙ. Ø§ÙØªØÙÙ Ù
٠اÙÙ
ÙØ§ØªÙØ ÙÙ Ø£Ù ÙØ³ÙÙØ© تÙ
ÙÙÙ
Ù
٠ربط Ù
ÙØªØ§Ø Ù
عÙ٠بشخص Ù
ا."" (EFF)"
+Key-signing party,Noun,"When you're using public key encryption, it's
important to be sure that the key you use to encrypt a message really belongs
to the recipient (see key verification). PGP makes this a little easier by
having a way to tell others ""I believe this key belongs to this person -- and
if you trust me, you should believe that too."" Telling the world that you
trust someone's key is called ""signing their key"": it means anyone who uses
that key can see you vouched for it. To encourage everyone to check and sign
each others keys, PGP users organize key-signing parties. They're almost, but
not quite, as exciting as they sound.
+Analogy: It's like a networking party, where you introduce your friends to
other friends.
+Synonyms: cryptoparty.
+Source EFF.",,
+Keyboard,Noun,[Signal],,
+Keyboard Layout,Noun,,,
+Keylogger,Noun,"A malicious program or device that records everything you type
into a device, including passwords and other personal details, allowing others
to secretly collect that information. (The ""key"" in keylogger refers to the
keys you have on your keyboard.) Keyloggers are often malware that users have
been tricked into downloading and running, or occasionally physical hardware
secretly plugged into a keyboard or device.
+Source EFF.",,
+Language pack,Noun,,ØØ²Ù
Ø© اÙÙØºØ§Øª,
+Lantern,Noun,[Lantern] Application Name (https://getlantern.org),,
+Lantern Cloud Server,Noun,[Lantern] âLanternâ is the name of an
application. (https://getlantern.org),,
+Last Name,,,,
+Launcher,Noun,,,
+Leak,Noun,Synonym: data leakage,,
+Lease,Noun,,,
+Leaseset,Noun,,,
+Let's Encrypt,Noun,Don't translate this. For more info see
https://en.wikipedia.org/wiki/Let%27s_Encrypt,,
+License Agreement,Noun,[Globaleaks],,
+Linked Identity,Noun,,,
+List,Noun,,ÙØ§Ø¦Ù
Ø©,
+Listen,Verb,,,
+Live CD,Noun,,,
+Live ISO,Noun,,,
+Live OS,Noun,,,
+Live System,Noun,,,
+Live USB,Noun,,,
+Login page,Noun,,,
+MB,Noun,[Orbot] megabyte,,
+MBR,Noun,,,
+MIME,Noun,[Signal],,
+MISP (Malware Information Sharing Platform),Noun,"[SES] ""The MISP threat
sharing platform is a free and open source software helping information sharing
of threat intelligence including cyber security indicators.
+A threat intelligence platform for gathering, sharing, storing and correlating
Indicators of Compromise of targeted attacks, threat intelligence, financial
fraud information, vulnerability information or even counter-terrorism
information."" -http://www.misp-project.org/",,
+MITM,Noun,"Suppose you believe you were speaking to your friend, Bahram, via
encrypted messenger. To check it's really him, you ask him to tell you the
city where you first met. ""Istanbul"" comes the reply. That's correct!
Unfortunately, without you or Bahram knowing, someone else online has been
intercepting all your communications. When you first connected to Bahram, you
actually connected to this person, and she, in turn, connected to Bahram. When
you think you are asking Bahram a question, she receives your message, relays
the question to Bahram, receives his answer back , and then sends it to you.
Even though you think you are communicating securely with Bahram, you are, in
fact, only communicating securely with the spy, who is also communicating
securely to Bahram! This is the man-in-the-middle attack. Men-in-the-middle can
spy on communications or even insert false or misleading messages into your
communications. Security-focused internet communications software needs to de
fend against the man-in-the-middle attack to be safe against attackers who
have control of any part of the Internet between two communicators.
+Synonyms: Man-in-the-middle attack.
+Source EFF.",,
+MM,Noun,,,
+MMS,Noun,âMultimedia Messaging Service (MMS) is a standard way to send
messages that include multimedia content to and from a mobile phone over a
cellular network.â https://en.wikipedia.org/wiki/Multimedia_Messaging_Service
[Signal],,
+MMSC,Noun,Multimedia Messaging Service Center. A mobile network operator's
store and forward server for relaying MMS (Multimedia Messaging Service)
messages. [Signal],,
+Magic Word,Noun,,ÙÙÙ
Ø© Ø³ØØ±ÙØ©,
+Mail routes,Noun,,,
+Maintainer,Noun,,,
+Malformed,Adjective,,,
+Malicious,Adjective,,,
+Malicious software,Noun,"Malware is short for malicious software: programs
that are designed to conduct unwanted actions on your device. Computer viruses
are malware. So are programs that steal passwords, secretly record you, or
delete your data.
+Synonyms: Malware.
+Source EFF.",برÙ
Ø¬ÙØ§Øª Ø®Ø¨ÙØ«Ø©,"""Ø§ÙØ¨Ø±Ù
Ø¬ÙØ§Øª Ø§ÙØ®Ø¨Ùثة
Ù٠برÙ
Ø¬ÙØ§Øª Ù
صÙ
Ù
Ø© ÙÙÙÙØ§Ù
Ø¨Ø£ÙØ¹Ø§Ù ØºÙØ± Ù
Ø±ØºÙØ¨
Ø¨ÙØ§ عÙÙ Ø¬ÙØ§Ø²Ù. ÙÙØ±Ùسات اÙÙÙ
بÙÙØªØ± برÙ
Ø¬ÙØ§Øª
Ø®Ø¨ÙØ«Ø©Ø ÙÙ
ا Ø£Ù Ø§ÙØ¨Ø±Ø§Ù
ج Ø§ÙØªÙ تسر٠ÙÙÙ
ات Ø§ÙØ³Ø±
Ø£Ù ØªØ³Ø¬Ù Ø£ÙØ´Ø·ØªÙ بشÙÙ Ø³Ø±Ù Ø£Ù ØªØØ°Ù Ø¨ÙØ§Ùات٠ÙÙ
برÙ
Ø¬ÙØ§Øª Ø®Ø¨ÙØ«Ø© Ø£ÙØ¶Ø§Ù."" (EFF)"
+Malware,Noun,"Malware is short for malicious software: programs that are
designed to conduct unwanted actions on your device. Computer viruses are
malware. So are programs that steal passwords, secretly record you, or delete
your data.
+Synonyms: Malicious software
+Source EFF.",برÙ
Ø¬ÙØ§Øª Ø®Ø¨ÙØ«Ø©,"""Ø§ÙØ¨Ø±Ù
Ø¬ÙØ§Øª Ø§ÙØ®Ø¨Ùثة
Ù٠برÙ
Ø¬ÙØ§Øª Ù
صÙ
Ù
Ø© ÙÙÙÙØ§Ù
Ø¨Ø£ÙØ¹Ø§Ù ØºÙØ± Ù
Ø±ØºÙØ¨
Ø¨ÙØ§ عÙÙ Ø¬ÙØ§Ø²Ù. ÙÙØ±Ùسات اÙÙÙ
بÙÙØªØ± برÙ
Ø¬ÙØ§Øª
Ø®Ø¨ÙØ«Ø©Ø ÙÙ
ا Ø£Ù Ø§ÙØ¨Ø±Ø§Ù
ج Ø§ÙØªÙ تسر٠ÙÙÙ
ات Ø§ÙØ³Ø±
Ø£Ù ØªØ³Ø¬Ù Ø£ÙØ´Ø·ØªÙ بشÙÙ Ø³Ø±Ù Ø£Ù ØªØØ°Ù Ø¨ÙØ§Ùات٠ÙÙ
برÙ
Ø¬ÙØ§Øª Ø®Ø¨ÙØ«Ø© Ø£ÙØ¶Ø§Ù."" (EFF)"
+Man-in-the-middle attack,Noun,"Suppose you believe you were speaking to your
friend, Bahram, via encrypted messenger. To check it's really him, you ask him
to tell you the city where you first met. ""Istanbul"" comes the reply. That's
correct! Unfortunately, without you or Bahram knowing, someone else online has
been intercepting all your communications. When you first connected to Bahram,
you actually connected to this person, and she, in turn, connected to Bahram.
When you think you are asking Bahram a question, she receives your message,
relays the question to Bahram, receives his answer back , and then sends it to
you. Even though you think you are communicating securely with Bahram, you are,
in fact, only communicating securely with the spy, who is also communicating
securely to Bahram! This is the man-in-the-middle attack. Men-in-the-middle can
spy on communications or even insert false or misleading messages into your
communications. Security-focused internet communications
software needs to defend against the man-in-the-middle attack to be safe
against attackers who have control of any part of the Internet between two
communicators.
+Synonyms: MITM
+Source EFF.",,
+Manage Contacts,Noun,[Martus] Martus menu option.,إدارة Ø¬ÙØ§Øª
Ø§ÙØ§ØªØµØ§Ù,
+Martus Desktop,Noun,[Martus],Martus Desktop,
+Martus Desktop Application,Noun,[Martus],تطبÙÙ Martus Desktop,
+Martus Information Management and Data Collection
Framework,Noun,[Martus],إطار عÙ
Ù Martus ÙØ¥Ø¯Ø§Ø±Ø© اÙÙ
عÙÙÙ
ات
ÙØ§ÙØªÙØ§Ø· Ø§ÙØ¨ÙØ§ÙØ§Øª,
+Martus Record Archive (*mba),Noun,[Martus],أرشÙÙ ÙØ´Ø±Ø§Øª Martus (*mba),
+Martus Report Format (.mrf),Noun,[Martus],ÙØ³Ù ØªÙØ±Ùر Martus (.mrf),
+Martus Search Specification,Noun,[Martus],Ù
ÙØ§ØµÙات Ø¨ØØ« Martus,
+"Master Boot Record, MBR",Noun,,,
+Master password,Noun,"A password used to unlock a store of other passwords or
other ways to unlock programs or messages. You should make a master password as
strong as you can.
+Source EFF.",,
+Match,,,,
+Matching,Adjective,[Globaleaks],,
+Matching Conditions,,,,
+Megabytes,Noun,[Globaleaks],,
+Message Format,Noun,,ÙØ³Ù Ø§ÙØ±Ø³Ø§ÙØ©,
+Message Of The Day,Noun,,,
+Mixnet,Noun,,,
+Mobile Martus,Noun,[Martus],Mobile Martus,
+Multihome,Noun,,,
+Multihoming,Noun,,,
+My Computer,Noun,The userâs home folder in some operating systems.,,
+NAT,Noun,Network Address Translation,,
+NGO,Noun,Non-Governmental Organization,Ù
ÙØ¸Ù
ات ØºÙØ± ØÙÙÙ
ÙØ©,
+NGOs,,,,
+NSA,,,,
+Name,Noun,,,
+Naming service,Noun,,,
+Navegador Tor,Noun,,,
+NetDB,Noun,network database,,
+NetVM,Noun,"""Network Virtual Machine""A type of VM which connects directly to
a network and provides access to that network to other VMs which connect to the
NetVM.",,
+Network database,Noun,,,
+Network drive,Noun,,,
+New,Adjective,,,
+Newsletter,Noun,,,
+Next,Noun,âNextâ button,,
+No,Noun,,,
+Node,Noun,,,
+Non-Tor,Noun,,,
+Notes,,,,
+OK,Noun,[Signal] âOKâ button which can also be translated as âAcceptâ,,
+OPML,Noun,"Outline Processor Markup Language
+
+""OPML (Outline Processor Markup Language) is an XML format for outlines
(defined as ""a tree, where each node contains a set of named attributes with
string values""). Originally developed by UserLand as a native file format for
the outliner application in its Radio UserLand product, it has since been
adopted for other uses, the most common being to exchange lists of web feeds
between web feed aggregators.""
+- https://en.wikipedia.org/wiki/Opml",,
+OS,Noun,Operating system,,
+OTR,Noun,Off The Record,,
+Observatory,Noun,,اÙÙ
رصد,
+Off,Adjective,,,
+Off-the-Record,Noun,"[Orbot] Messaging systems are often unencrypted. OTR is a
way of adding encryption to them, so that you can keep using familiar networks
like Facebook chat, Google Chat or Hangouts but with your messages more
resistant to surveillance. The OTR cryptographic protocol provides strong
encryption for messaging conversations. (Synonyms : OTR) (Source EFF)",,
+Oil pipeline,Noun,,,
+On,Preposition,,,
+One-time password,Noun,"Passwords are usually semi-permanent: once you set
them up, you can keep using them until you manually change or reset them.
One-time passwords only work once. Some one-time password systems work by
having a tool or program that can create many different one-time passwords,
that you use in turn. This is useful if you're afraid that there may be a
key-logger on a system where you have to type in a password.
+Source EFF.",,
+Onion,Noun,[Tor],,
+Onion Address,Noun,[Tor],,
+Onion Browser,Noun,[Tor],,
+Onion Circuits,Noun,[Tor],,
+Onion routing,Noun,[Tor],,
+Open Observatory of Network Interference,,,,
+Open Observatory of Network Interference (OONI) ,,,,
+Open Observvatory of Network Interference (OONI),,,,
+Open Source,,,,
+Open Whisper Systems,Noun,Organization name. Do not translate. [Signal],,
+Open-source software,Noun,"Open source software, or free software, is software
that can be distributed freely in a form that lets others modify it and rebuild
it from scratch. While it is known as âfree software,"" it's not necessarily
free as in zero-cost: FLOSS programmers can ask for donations, or charge for
support or for copies. Linux is an example of a free, open source program, as
are Firefox and Tor.
+Synonyms: FLOSS, free, libre and open-source software, free software
+Source EFF.",Ø§ÙØ¨Ø±Ù
Ø¬ÙØ§Øª Ø§ÙØØ±Ø© ÙØ§ÙÙ
صدر اÙÙ
شاعÙ,"Ø§ÙØ¨Ø±Ù
Ø¬ÙØ§Øª Ù
ÙØªÙØØ© اÙÙ
صدر - Ø£Ù Ø§ÙØ¨Ø±Ù
Ø¬ÙØ§Øª Ø§ÙØØ±Ø© - Ù٠برÙ
Ø¬ÙØ§Øª ÙÙ
ÙÙ ØªÙØ²ÙØ¹ÙØ§ Ø¨ØØ±ÙØ©
بشÙÙ ÙØ³Ù
Ø ÙÙØ¢Ø®Ø±Ù٠بتعدÙÙÙØ§ ÙØ¥Ø¹Ø§Ø¯Ø© تÙÙÙÙÙØ§ Ù
جدداÙ. ÙÙ ØÙ٠أÙÙØ§ ØØ±Ø© ÙÙØ¯ ÙØ§ تÙÙÙ ""Ù
جاÙÙØ©"":
Ù
برÙ
ج٠FLOSS ÙÙ
ÙÙ ÙÙÙ
Ø·ÙØ¨ Ø§ÙØªØ¨Ø±Ø¹Ø§Øª Ø£Ù ØªÙØ§Ø¶Ù
أجرة ÙØªÙدÙÙ
Ø§ÙØ¯Ø¹Ù
Ø£Ù ÙØ¨Ø¹Ø¶ اÙÙØ³Ø®. ÙÙÙÙÙØ³ Ù
ثا٠عÙÙ Ø¨Ø±ÙØ§Ù
ج ØØ± Ù
ÙØªÙØ Ø§ÙÙ
ØµØ¯Ø±Ø Ù
Ø«Ù
ÙØ§ÙرÙÙÙØ³ ÙØªÙر Tor."
+OpenPGP,Noun,OpenPGP is a open specification and standard that implements PGP
(Pretty Good Privacy),,
+OpenPGP key,Noun,,,
+Operating System (OS),Noun,"A program that runs all the other programs on a
computer. Windows, Android and Apple's OS X and iOS are all examples of
operating systems. (Source: EFF)(Synonym: OS) [Signal]",,
+Optional Setup,Noun,,,
+Orbot,Noun,[Orbot] Name of application. Do not translate.,,
+Oudated,Adjective,,,
+Out-of-band verification,Noun,"""Out-of-band"" means any way of communicating
outside of the current method. Verifying the identity of the person you're
talking to over an insecure communication system often requires communicating
out-of-band via another method that is less vulnerable to the same kind of
attack. So, for instance, you might check that you are using someone's correct
public key by talking to them in person, before using it to encrypt your email.
+Synonyms: out-of-band
+Source EFF.",Ø§ÙØªÙØ«Ù٠خارج Ø§ÙØØ²Ù
Ø©,"""خارج Ø§ÙØØ²Ù
Ø©""
ÙØ¹ÙÙ Ø£Ù ÙØ³ÙÙØ© ÙÙØªÙاص٠خارج Ø§ÙØ£Ø³ÙÙØ¨ اÙÙ
ستخدÙ
ØØ§ÙÙØ§Ù. Ø§ÙØªØÙÙ Ù
Ù ÙÙÙØ© شخص ØªØªØØ¯Ø« Ù
ع٠عبر
ÙØ¸Ø§Ù
Ø§ØªØµØ§ÙØ§Øª ØºÙØ± Ø¢Ù
Ù ØºØ§ÙØ¨Ø§Ù Ù
ا ÙØªØ·Ùب
Ø§ÙØªÙاص٠خارج Ø§ÙØØ²Ù
Ø© باستخداÙ
أسÙÙØ¨ آخر Ø£ÙÙ
عرضة ÙÙÙØ³ اÙÙÙØ¹ Ù
٠اÙÙØ¬ÙÙ
. ÙØ°Ø§ عÙ٠سبÙ٠اÙÙ
Ø«Ø§ÙØ ÙØ¯ ترغب Ø¨Ø§ÙØªØÙÙ Ù
٠أÙ٠تستخدÙ
اÙÙ
ÙØªØ§Ø
Ø§ÙØ¹ÙÙÙ Ø§ÙØµØÙØ ÙØ´Ø®Øµ Ù
ا Ø¨Ø§ÙØªØØ¯Ø« Ù
Ø¹Ù ÙØ¬Ùا ÙÙØ¬Ù
ÙØ¨Ù استخداÙ
اÙÙ
ÙØªØ§Ø ÙØªØ´ÙÙØ± رسائÙ٠إÙÙÙ."
+Outdated,Adjective,,,
+Overhead,Noun,,,
+Overlay network,Noun,,,
+Overview,Noun,[Globaleaks],,
+P.O. Box,Noun,,,
+PDF,Noun,,,
+PGP,Noun,"""Pretty Good Privacy"" PGP is a commercial software for
cyphering",PGP,"ÙØ§Ù PGP (Ø£Ù Pretty Good Privacy ""Ø®ØµÙØµÙØ© Ø¬ÙØ¯Ø©
جداÙ"") Ù
٠أÙÙ Ø§ÙØªØ·Ø¨ÙÙØ§Øª Ø§ÙØ´Ø¹Ø¨ÙØ© ÙÙØªØ´ÙÙØ±
باستخداÙ
اÙÙ
ÙØªØ§Ø Ø§ÙØ¹ÙÙÙ. ÙØªØ¨ ÙÙ٠زÙÙ
رÙ
اÙ
Ø§ÙØ¨Ø±ÙاÙ
ج ÙÙ 1991 ÙÙ
ساعدة اÙÙØ§Ø´Ø·ÙÙ ÙØºÙرÙÙ
عÙÙ
ØÙ
Ø§ÙØ© Ø§ØªØµØ§ÙØ§ØªÙÙ
. ØÙÙØª Ù
ع٠رسÙ
ÙØ§Ù ØÙÙÙ
Ø©
اÙÙÙØ§Ùات اÙÙ
ØªØØ¯Ø© Ø¹ÙØ¯Ù
ا Ø§ÙØªØ´Ø± Ø§ÙØ¨Ø±ÙاÙ
ج خارج
اÙÙÙØ§Ùات اÙÙ
ØªØØ¯Ø©. ÙØ§Ù ØªØµØ¯ÙØ± Ø§ÙØ£Ø¯Ùات Ø§ÙØªÙ
تتضÙ
٠تشÙÙØ±Ø§Ù ÙÙÙØ§Ù عبر اÙÙ
ÙØªØ§Ø Ø§ÙØ¹ÙÙ٠أÙ
Ø±Ø§Ù ØºÙØ± ÙØ§ÙÙÙÙ Ù٠ذا٠اÙÙÙØª. ÙØªØ§Ø¨Ø¹ PGP ÙØ¬ÙدÙ
ÙØ£Ø¯Ø§Ø© برÙ
Ø¬ÙØ© ØªØ¬Ø§Ø±ÙØ©. ÙÙØªÙÙØ± تطبÙÙ ØØ± ÙÙÙØ³
اÙÙ
Ø¹ÙØ§Ø± Ø§ÙØ°Ù ÙØ³ØªØ®Ø¯Ù
Ù PGP ÙÙØ¯Ø¹Ù GnuPG (Ø£Ù GPG).
ÙÙØ£Ù Ø§ÙØ¥Ø«ÙÙÙ ÙØ³ØªØ®Ø¯Ù
ا٠ÙÙØ³ اÙÙ
ÙØ§Ø±Ø¨Ø©Ø ÙØ«ÙراÙ
Ù
ا ÙÙÙÙ Ø§ÙØ
¨Ø¹Ø¶ Ø£ÙÙÙ
ÙØ³ØªØ®Ø¯Ù
ÙÙ Ù
ÙØªØ§Ø PGP Ø£Ù ÙØ±Ø³ÙÙÙ Ø±Ø³Ø§ÙØ©
PGP ØØªÙ ÙØ¥Ù ÙØ§ÙÙØ§ ÙØ³ØªØ®Ø¯Ù
ÙÙ GnuPG."
+PIN,Noun,Personal Identification Number [Signal],,
+PV,Noun,"[QubesOS] ""Paravirtualization""An efficient and lightweight
virtualization technique originally introduced by the Xen Project and later
adopted by other virtualization platforms.",,
+PVHVM,Noun,"[QubesOS] ""Paravirtualization on Hardware Virtual Machine""To
boost performance, fully virtualized HVM guests can use special paravirtual
device drivers (PVHVM or PV-on-HVM drivers).",,
+Padding,Noun,,,
+Page Report,Noun,Type of report generated by Martus - not one page of a
report.,ØµÙØØ© Ø§ÙØªÙØ±ÙØ±,
+Pane,Noun,,جزء,
+Panic,Noun,"Panic button, panic app",,
+Passive adversary,Noun,"A passive adversary is one that can listen to your
communications, but cannot directly tamper with them.
+Source EFF.",,
+Passphrase,Noun,,,
+Password manager,Noun,"A tool that can encrypt and store your passwords using
a single master password making it practical to use many different passwords on
different sites and services without having to memorize them.
+Synonyms: Secure password database; password safe.
+Source EFF.",,
+Password safe,Noun,"A tool that can encrypt and store your passwords using a
single master password making it practical to use many different passwords on
different sites and services without having to memorize them.
+Synonyms: Secure password database, Password manager.
+Source EFF.",,
+Passwords field,Noun,,,
+Passwords field ,Noun,,,
+Peer-to-Peer (P2P),Adjective,,,
+Perfect forward secrecy,Noun,"A property of a secure messaging system which
ensures that your past communications can remain secure even if one of the
private keys is stolen later. For HTTPS websites, forward secrecy is an
important protection against adversaries like intelligence agencies which may
record large amounts of traffic and use a stolen key to decrypt it. For
messaging and chat systems, forward secrecy is necessary to ensure that deleted
messages are really deleted, but you will also need to either disable logging
or securely delete past messages.
+Synonyms: Forward secrecy.
+Source EFF.",Ø§ÙØ³Ø±ÙØ© اÙÙ
Ø³ØªÙØ¨ÙÙØ©,Ø®Ø§ØµÙØ© Ù
Ù Ø®ÙØ§Øµ ÙØ¸Ù
Ø§ÙØªØ±Ø§Ø³Ù Ø§ÙØ¢Ù
٠تضÙ
Ù Ø£Ù Ø§ØªØµØ§ÙØ§Øª Ø§ÙØ³Ø§Ø¨ÙØ©
ستبÙ٠آÙ
ÙØ© ØØªÙ ÙÙ ØØ§Ù تÙ
ت Ø³Ø±ÙØ© Ø£ØØ¯ اÙÙ
ÙØ§ØªÙØ
Ø§ÙØ®Ø§ØµØ© ÙØ§ØÙاÙ. Ø¥Ù Ø§ÙØ³Ø±ÙØ© اÙÙ
Ø³ØªÙØ¨ÙÙØ© ØÙ
Ø§ÙØ©
ÙØ§Ù
Ø© ÙÙ
ÙØ§Ùع HTTPS ضد Ø§ÙØ®ØµÙÙ
Ù
ث٠ÙÙØ§Ùات
Ø§ÙØ§Ø³ØªØ®Ø¨Ø§Ø±Ø§Øª ÙØ§ÙØªÙ ÙØ¯ تسج٠ÙÙ
ا٠ضخÙ
ا٠Ù
Ù Ù
Ø±ÙØ± Ø´Ø¨ÙØ© Ø§ÙØ¥ÙØªØ±ÙØª ÙØªØ³ØªØ®Ø¯Ù
Ù
ÙØªØ§ØØ§Ù Ù
سرÙÙØ§Ù
ÙÙ٠تشÙÙØ±Ù. ÙÙØªØ±Ø§Ø³Ù اÙÙ
باشر ÙØ£ÙظÙ
Ø©
Ø§ÙØ¯Ø±Ø¯Ø´Ø©Ø ÙØ¥Ù Ø§ÙØ³Ø±ÙØ© اÙÙ
Ø³ØªÙØ¨ÙÙØ© Ø¶Ø±ÙØ±ÙØ© ÙØ¶Ù
Ø§Ù Ø£Ù Ø§ÙØ±Ø³Ø§Ø¦Ù اÙÙ
ØØ°ÙÙØ© ØªØØ°Ù ÙØ¹ÙØ§ÙØ ÙÙÙÙÙ
Ø³ØªØØªØ§Ø¬ Ø¥Ù
ا ÙÙ ÙØµÙ Ø§ÙØ³Ø¬Ù Ø£Ù ØØ°Ù Ø§ÙØ±Ø³Ø§Ø¦Ù
Ø§ÙØ³Ø§Ø¨ÙØ© بشÙ٠آÙ
Ù.
+Permalink,Noun,,,
+Persistence wizard,Noun,,,
+Persistent Storage,Noun,,,
+Personal information,Noun,,,
+Photo story,Noun,,,
+Phrases,Noun,,,
+Pie Chart,Noun,[Martus],Ù
خطط دائرÙ,
+Piece,Noun,,,
+Plaintext,Noun,[Globaleaks] [Signal],ÙØµ ØµÙØ±Ù,
+Plan,Noun,,,
+Plans,Noun,,,
+Platform,Noun,[Globaleaks],,
+Please,Adverb,,,
+Pledge,,,,
+Pluggable Transport,Noun,,,
+Pluggable Transports,Noun,,,
+Pluggable Transports Bundle,Noun,,,
+Policy,Verb,,,
+Pool,Noun,,,
+Post,Noun,,,
+Post,Verb,,,
+Post-traumatic stress,Noun,,,
+Posted,Verb,,,
+Power Off,Verb,,,
+Powering,,,,
+Powering Digital Resistance,,,,
+Powering Digital Resisteance,,,,
+Preparation,Noun,,,
+Pretty Good Privacy,Noun,"PGP or Pretty Good Privacy was one of the first
popular implementations of public key cryptography. Phil Zimmermann, its
creator, wrote the program in 1991 to help activists and others protect their
communications. He was formally investigated by the US government when the
program spread outside the United States. At the time, exporting tools that
included strong public key encryption was a violation of US law.
+PGP continues to exist as a commercial software product. A free implementation
of the same underlying standard that PGP uses called GnuPG (or GPG) is also
available. Because both use the same interchangeable approach, people will
refer to using a âPGP keyâ or sending a âPGP messageâ, even if they are
using GnuPG. (Synonyms: PGP) (Source: EFF)",,
+Primary,Noun,,Ø£ÙÙÙÙÙ,
+Procedure,,,,
+Proceed,Verb,,,
+Projects,Noun,,,
+Promote,,,,
+Protect,,,,
+Protocol,Noun,"A communications protocol is a way of sending data between
programs or computers. Software programs that use the same protocol can talk to
each other: so web browsers and web servers speak the same protocol, called
""http"". Some protocols use encryption to protect their contents. The secure
version of the http protocol is called ""https"". Another example of an
encrypted protocol used by many different programs is OTR (Off-the-Record), a
protocol for secure instant messaging.
+Source EFF.",Ø¨Ø±ÙØªÙÙÙÙ,"""Ø¥Ù Ø£Ù Ø¨Ø±ÙØªÙÙÙÙ ÙÙØ§ØªØµØ§Ù
ÙÙ ÙØ³ÙÙØ© ÙØ¥Ø±Ø³Ø§Ù Ø§ÙØ¨ÙØ§ÙØ§Øª بÙÙ Ø§ÙØ¨Ø±Ø§Ù
ج Ø£Ù
اÙÙÙ
بÙÙØªØ±Ø§Øª. ØªØ³ØªØ·ÙØ¹ Ø§ÙØ¨Ø±Ù
Ø¬ÙØ§Øª Ø§ÙØªÙ تستخدÙ
ÙÙØ³ Ø§ÙØ¨Ø±ÙتÙÙÙÙ Ø£Ù ØªØªÙØ§ØµÙ Ù
ع Ø¨Ø¹Ø¶ÙØ§ بعضاÙ:
تتÙÙÙ
اÙÙ
ØªØµÙØØ§Øª ÙÙ
خدÙ
ات Ø§ÙØ¥ÙØªØ±ÙØª ÙÙØ³
Ø§ÙØ¨Ø±ÙتÙÙÙÙ ÙÙØ¯Ø¹Ù ""http"". تستخدÙ
بعض
Ø§ÙØ¨Ø±ÙتÙÙÙÙØ§Øª Ø§ÙØªØ´ÙÙØ± ÙØÙ
Ø§ÙØ© Ù
ØØªÙÙØ§ØªÙا.
اÙÙØ³Ø®Ø© Ø§ÙØ¢Ù
ÙØ© Ù
Ù Ø¨Ø±ÙØªÙÙÙÙ http تدع٠""https"".ÙOTR
ÙÙ Ù
ثا٠آخر عÙÙ Ø¨Ø±ÙØªÙÙÙÙ Ù
Ø´ÙØ± تستخدÙ
Ù
Ø§ÙØ¹Ø¯Ùد Ù
Ù Ø§ÙØ¨Ø±Ø§Ù
ج اÙÙ
ختÙÙØ©Ø ÙÙÙ Ø¨Ø±ÙØªÙÙÙÙ
ÙÙØªØ±Ø§Ø³Ù اÙÙ
باشر Ø§ÙØ¢Ù
Ù."" (EFF)"
+Province,Adjective,,,
+Province,Noun,,,
+ProxyVM,Noun,"[QubesOS] ""Proxy Virtual Machine""A type of VM which proxies
network access for other VMs",,
+Pseudonym,Noun,"A name that you choose to use in some context (like an online
forum) and that others may come to recognize, but that isnât connected to
names that people know you by in your day-to-day life.
+Source EFF.",,
+PsiCash,Noun,[Psiphon],,
+Psiphon,Noun,"Name of an organization and application. Please do not translate
this term. If needed, you can transcribe the organization / tool name. For
example, the name is transcribed in Arabic, Persian and Amharic.",,
+Public Information File (*.mpi),Noun,[Martus] Files containing the account's
public information,Ù
ÙÙØ§Øª اÙÙ
عÙÙÙ
ات Ø§ÙØ¹ÙÙÙØ© (*.mpi),
+Public key cryptography,Noun,,,
+Public key encryption,Noun,"Traditional encryption systems use the same
secret, or key, to encrypt and decrypt a message. So if I encrypted a file with
the password ""bluetonicmonster"", you would need both the file and the secret
""bluetonicmonster"" to decode it. Public key encryption uses two keys: one to
encrypt, and another to decrypt. This has all kinds of useful consequences. For
one, it means that you can hand out the key to encrypt messages to you, and as
long as you keep the other key secret, anyone with that key can talk to you
securely. The key you hand out widely is known as the ""public key"": hence the
name of the technique. Public key encryption is used to encrypt email and files
by Pretty Good Privacy (PGP), OTR for messaging, and SSL/TLS for web browsing.
+Synonyms: Asymmetric key encryption, Public key cryptography.
+Source EFF.",,
+Public key servers,Noun,"If you plan to send a secure message to someone who
uses public key cryptography like PGP, you need to know what key to use to
encrypt your message. Public key servers act as a phonebook for such keys,
allowing software to use an email address, name, or key fingerprint to search
for a full key and download it. There are many PGP public key servers, but they
usually share their key collections with each other. Keyservers can't verify
whether the keys they publish are genuine or forgeries. Anyone can upload a key
to a public key serverâin anyone's name. That means that a key connected to a
person's name or email on a keyserver might not be their real key. In order to
check the authenticity of a key, you need to check its signatures, or confirm
its fingerprint with the original user in a trustworthy way.
+
+PGP allows you to sign other people's keys, which is a way of using your own
key to assert that a certain key is the right one to use to contact another
person. This is meant to provide a way of distinguishing between genuine and
fake keys; if people sign the right keys for people they know and communicate
with, others can use those signatures to confirm that the genuine keys are
genuine. When you download a key from a key server, it may include signatures
from other people who affirm that it's the right one. If you know those people
and know that you have the right key for them, you can have more confidence in
the newly downloaded key. This verification process is also called the web of
trust. Its advantage is that it's decentralized and not controlled by any
authority, so you don't have to believe a certain company or government about
which keys to use when writing to new people. Instead, you can believe your own
social networks. One important disadvantage of the web of trust is t
hat publishing signatures for other people's keys tells the whole world who
your contacts are; it creates public evidence that you know particular people.
Also, using the web of trust correctly requires a good deal of time and
attention, and some communities rarely or never participate. (Source: EFF)",,
+Q&A,Noun,,,
+QR Code,,,,
+QR code,Noun,[Signal] [Orbot],,
+"QR code, code",Noun,[Signal],,
+Qubes Global Settings,Noun,[QubesOS],,
+Qubes OS,Noun,"[QubesOS] Do not translate ""Qubes OS""",,
+Query,Noun,,,
+Questionnaire,,,,
+RAM,Noun,,,
+RMI,Noun,,,
+ROM,Noun,[Signal],,
+Randomization,Noun,,,
+Rate,Noun,,,
+Read,Verb,,,
+ReadMe,Noun,The ReadMe file included with any new software release that
describes changes to software,Ø§ÙØ±Ø£ÙÙ (Ù
ÙÙ),
+Reboot,Noun,,,
+Reboot,Verb,,,
+Record ID,Noun,,رÙÙ
تسجÙÙ,
+Reference Guide,Noun,,دÙÙÙ Ø§ÙØ¥Ø±Ø´Ø§Ø¯Ø§Øª,
+Referer,Noun,,,
+Referer spoofing,Noun,,,
+Refresh,Noun,,,
+Refresh,Verb,,,
+Registration Lock,Noun,[Signal],,
+Reject,Verb,,,
+Release key,Noun,,,
+Removable media,Noun,,,
+Removable media drive,Noun,,,
+Repliable datagram,Noun,,,
+Required,Adjective,,,
+Reseed,Verb,,,
+Retry,Verb,,,
+Retweet,Noun,,,
+Retweet,Verb,,,
+Reusable Choice,Noun,,Ø§Ø®ØªÙØ§Ø± ÙØ§Ø¨Ù ÙØ¥Ø¹Ø§Ø¯Ø© Ø§ÙØ¥Ø³ØªØ®Ø¯Ø§Ù
,
+Revocation certificate,Noun,"What happens if you lose access to a secret key,
or it stops being secret? A revocation certificate is a file that you can
generate that announces that you no longer trust that key. You generate it when
you still have the secret key, and keep it for any future disaster.
+Source EFF.",,
+Reward,Noun,,,
+Rich Text,Noun,,ÙØµ ÙØ§Ùر,
+Ring Tone,Noun,,,
+Rip,Noun,,,
+Risk analysis,Noun,"In computer security, risk analysis is calculating the
chance that threats might succeed, so you know how much effort to spend
defending against them. There may be many different ways that you might lose
control or access to your data, but some of them are less likely than others.
Assessing risk means deciding which threats you are going to take seriously,
and which may be too rare or too harmless (or too difficult to combat) to worry
about. See threat modeling.
+Synonyms: Risk, Risk Assessment.
+Source EFF.",تØÙÙÙ Ø§ÙØ®Ø·Ø±,"""Ù٠أÙ
٠اÙÙÙ
بÙÙØªØ±Ø
تØÙÙÙ Ø§ÙØ®Ø·Ø± ÙÙ ØØ³Ø§Ø¨ Ø§ØØªÙ
Ø§Ù ÙØ¬Ø§Ø Ø§ÙØªÙØ¯ÙØ¯Ø
ØØªÙ تعر٠Ù
ÙØ§Ø¯Ø± Ø§ÙØ¬Ùد اÙÙ
Ø·ÙÙØ¨ ÙØªØ¯Ø§Ùع ع٠ÙÙØ³Ù
بÙ
ÙØ§Ø¬ÙØªÙØ§. ÙØ¯ ÙÙÙÙ ÙÙØ§Ù اÙÙØ«Ùر Ù
Ù Ø§ÙØ·Ø±Ù
Ø§ÙØªÙ ÙØ¯ تخسر Ø¨ÙØ§ Ø§ÙØ³Ùطرة أ٠اÙÙØ¯Ø±Ø© عÙÙ
اÙÙØµÙ٠إÙÙ Ø¨ÙØ§ÙØ§ØªÙØ ÙÙÙÙ Ø§ØØªÙ
ا٠ÙÙÙØ¹Ùا
ÙØªÙØ§ÙØª. ÙØ¹Ù٠تÙÙÙÙ
Ø§ÙØ®Ø·Ø± Ø£Ù ØªØØ¯Ø¯ Ø§ÙØªÙØ¯ÙØ¯Ø§Øª
Ø§ÙØªÙ Ø³ØªÙØ¬ÙÙØ§ Ø¨Ø¬Ø¯ÙØ©."" (EFF)"
+Risk assessment,Noun,"In computer security, risk analysis is calculating the
chance that threats might succeed, so you know how much effort to spend
defending against them. There may be many different ways that you might lose
control or access to your data, but some of them are less likely than others.
Assessing risk means deciding which threats you are going to take seriously,
and which may be too rare or too harmless (or too difficult to combat) to worry
about. See threat modeling.
+Synonyms: Risk, Risk analysis.
+Source EFF.",تØÙÙÙ Ø§ÙØ®Ø·Ø±,"""Ù٠أÙ
٠اÙÙÙ
بÙÙØªØ±Ø
تØÙÙÙ Ø§ÙØ®Ø·Ø± ÙÙ ØØ³Ø§Ø¨ Ø§ØØªÙ
Ø§Ù ÙØ¬Ø§Ø Ø§ÙØªÙØ¯ÙØ¯Ø
ØØªÙ تعر٠Ù
ÙØ§Ø¯Ø± Ø§ÙØ¬Ùد اÙÙ
Ø·ÙÙØ¨ ÙØªØ¯Ø§Ùع ع٠ÙÙØ³Ù
بÙ
ÙØ§Ø¬ÙØªÙØ§. ÙØ¯ ÙÙÙÙ ÙÙØ§Ù اÙÙØ«Ùر Ù
Ù Ø§ÙØ·Ø±Ù
Ø§ÙØªÙ ÙØ¯ تخسر Ø¨ÙØ§ Ø§ÙØ³Ùطرة أ٠اÙÙØ¯Ø±Ø© عÙÙ
اÙÙØµÙ٠إÙÙ Ø¨ÙØ§ÙØ§ØªÙØ ÙÙÙÙ Ø§ØØªÙ
ا٠ÙÙÙØ¹Ùا
ÙØªÙØ§ÙØª. ÙØ¹Ù٠تÙÙÙÙ
Ø§ÙØ®Ø·Ø± Ø£Ù ØªØØ¯Ø¯ Ø§ÙØªÙØ¯ÙØ¯Ø§Øª
Ø§ÙØªÙ Ø³ØªÙØ¬ÙÙØ§ Ø¨Ø¬Ø¯ÙØ©."" (EFF)"
+Roadmap,Noun,,,
+Role-based access control,Noun,[Globaleaks],,
+Root,Noun,,,
+RouterInfo,Noun,,,
+Ruleset Tests,Noun,,,
+Running environment,Noun,,,
+Runtime,Noun,,,
+SD card,Noun,,,
+SES (Suspicious Email Submitter),Noun,[SES] Project Name. Please do not
translate.,,
+SIM card,Noun,"A small, removable card that can be inserted into a mobile
phone in order to provide service with a particular mobile phone company. SIM
(subscriber identity module) cards can also store phone numbers and text
messages.
+Source EFF.",Ø¨Ø·Ø§ÙØ© ÙØ§ØªÙ,"""Ø¨Ø·Ø§ÙØ© ØµØºÙØ±Ø© ÙÙ
ÙÙ
Ø¥Ø²Ø§ÙØªÙØ§Ø ÙÙØªÙ
إدخاÙÙØ§ Ù٠اÙÙÙØ§ØªÙ اÙÙ
ØÙ
ÙÙØ©
بغرض تÙÙÙØ± Ø§ÙØ®Ø¯Ù
Ø© Ù
Ù Ø´Ø±ÙØ© ÙØ§ØªÙ Ù
ØÙ
ÙÙ Ù
عÙÙØ©.
ÙÙÙ
ÙÙ ÙØ¨Ø·Ø§ÙØ© ""Ø§ÙØ³ÙÙ
"" (Subscriber Identity Module) Ø£Ù
ØªØ®Ø²Ù Ø£Ø±ÙØ§Ù
اÙÙÙØ§ØªÙ ÙØ§Ùرسائ٠اÙÙØµÙØ©."" (EFF)"
+SMS,Noun,"âSMS (short message service) is a text messaging service component
of most telephone, internet, and mobile-device systems.[1] It uses standardized
communication protocols to enable mobile devices to exchange short text
messages.â https://en.wikipedia.org/wiki/SMS Synonym: text message [Signal]",,
+SMTP,Noun,[Globaleaks],,
+SOCKS,Noun,"[Orbot] ""Socket Secure (SOCKS) is an Internet protocol that
exchanges network packets between a client and server through a proxy server.
SOCKS5 additionally provides authentication so only authorized users may access
a server. Practically, a SOCKS server proxies TCP connections to an arbitrary
IP address, and provides a means for UDP packets to be forwarded."" - Wikipedia
(https://en.wikipedia.org/wiki/SOCKS)",,
+SSD (Solid-State Drive),Noun,"""A solid-state drive (SSD), or solid-state disk
is a solid-state storage device that uses integrated circuit assemblies as
memory to store data persistently.""
-https://en.wikipedia.org/wiki/Solid-state_drive
+
+""Historically, computers stored data on rotating magnetic discs. Mobile
devices and increasing numbers of personal computers now store permanent data
on non-moving drives. These SSD drives are currently more expensive, but much
faster than magnetic storage. Unfortunately, it can be more difficult to
reliably and permanently remove data from SSD drives.""
+Source EFF",,
+SSH,Noun,"""Secure Shell (SSH) is a cryptographic network protocol for
operating network services securely over an unsecured network.[1] The best
known example application is for remote login to computer systems by users."" -
Wikipedia (https://en.wikipedia.org/wiki/Secure_Shell)",SSH,Ø¥Ù SSH Ø£Ù
(Secure SHell) Ù٠أسÙÙØ¨ ÙØ³Ù
Ø ÙÙ Ø¨Ø§ÙØªØÙÙ
بÙÙ
بÙÙØªØ±
Ø¨Ø¹ÙØ¯ بأÙ
ا٠عبر ÙØ§Ø¬ÙØ© سطر Ø§ÙØ£ÙاÙ
ر. Ø¥ØØ¯Ù Ù
ÙØ²Ø§Øª Ø¨Ø±ÙØªÙÙÙÙSSH Ù٠أÙÙ ÙÙ
ÙÙ٠استخداÙ
Ù ÙÙÙÙ
ØØ±ÙØ© Ù
Ø±ÙØ± Ø§ÙØ¥ÙØªØ±ÙØª بÙÙ ÙÙ
بÙÙØªØ±ÙÙØ Ø¨Ø§ÙØ¥Ø¶Ø§ÙØ©
Ø¥ÙÙ Ø¥Ø±Ø³Ø§Ù Ø§ÙØ£ÙاÙ
ر. ÙØ¥Ùشاء ÙØµÙØ© SSHØ ÙØØªØ§Ø¬ Ø£Ù
ÙØ¹Ù
٠اÙÙØ¸Ø§Ù
Ø§ÙØ¨Ø¹Ùد ÙÙ
خدÙ
SSHØ ÙØ¬Ùاز٠اÙÙ
ØÙÙ
Ø³ÙØØªØ§Ø¬ Ø¨Ø±ÙØ§Ù
جا٠ÙÙÙÙØ§Ù ÙÙ SSH.
+SSL,Noun,"""Transport Layer Security (TLS) and its predecessor, Secure Sockets
Layer (SSL), both frequently referred to as ""SSL"", are cryptographic
protocols that provide communications security over a computer network. Several
versions of the protocols find widespread use in applications such as web
browsing, email, Internet faxing, messaging, and voice-over-IP (VoIP).
Websites are able to use TLS to secure all communications between their servers
and web browsers."" - Wikipedia
(https://en.wikipedia.org/wiki/Transport_Layer_Security)",SSL,Ø§ÙØªÙÙÙÙÙØ¬Ùا
Ø§ÙØªÙ تسÙ
Ø ÙÙ Ø£Ù ØªØØ§Ùظ عÙ٠اتصا٠آÙ
Ù ÙÙ
Ø´ÙØ±
بÙÙ ÙÙ
بÙÙØªØ±Ù ÙØ¨Ø¹Ø¶ اÙÙ
ÙØ§Ùع ÙØ§ÙخدÙ
ات عÙÙ
Ø§ÙØ¥ÙØªØ±ÙØª. Ø¹ÙØ¯Ù
ا تتص٠بÙ
ÙÙØ¹ Ù
ا عبر SSLØ ÙØ¨Ø¯Ø£
عÙÙØ§Ù ذÙ٠اÙÙ
ÙÙØ¹ ب٠HTTPS Ø¹ÙØ¶Ø§Ù ع٠HTTP.
+SSL Observatory,Noun,,Ù
Ø±ÙØ§Ø¨ SSL,
+SVM,Noun,Support Vector Machine,,
+SVM (Support Vector Machine),Noun,"""In machine learning, support vector
machines (SVMs, also support vector networks) are supervised learning models
with associated learning algorithms that analyze data used for classification
and regression analysis."" -
https://en.wikipedia.org/wiki/Support_vector_machine",,
+Safe-house,Noun,,,
+Satellite Provider,Noun,,,
+Screen Lock,Noun,[Signal],,
+Search,Noun,,,
+Search Engine,Noun,,,
+Search Results,Noun,Application menu item.,ÙØªØ§Ø¦Ø¬ Ø§ÙØ¨ØØ«,
+Secure Sockets Layer,Noun,,,
+Secure Sockets Layer (SSL),Noun,"The technology that permits you to maintain a
secure, encrypted connection between your computer and some of the websites and
Internet services that you visit. When you're connected to a website through
this technology, the address of the website will begin with HTTPS rather than
HTTP. Officially, its name was changed to Transport Layer Security (TLS) in
1999, but many people still use the old name, Secure Sockets Layer (SSL).
(Synonyms: Transport layer security) (Source: EFF)",,
+Secure password database,Noun,"A tool that can encrypt and store your
passwords using a single master password making it practical to use many
different passwords on different sites and services without having to memorize
them. (Synonyms: Password manager, password safe) (Source EFF)",,
+Security certificate,Noun,"A way to confirm automatically that a public key is
correct (is really the one that's used by a particular entity), in order to
prevent man-in-the-middle attacks. Most often used by web sites to prove to
your browser that you have a secure connection to the real site, and not to
some other system that's tampering with your connection.
+(Synonyms: Digital certificate) (Source EFF)",,
+Security question,Noun,"To supplement passwords, some systems use ""security
questions."" These are queries to which only you are supposed to know the
answer. The problem with security questions is that they are really just extra
passwords that have potentially guessable or discoverable answers. We recommend
you treat them as any other password: create a long, novel, random, phrase to
answer them, and record that somewhere safe. So the next time your bank asks
you your mother's maiden name, you should be ready to answer ""Correct Battery
Horse Staple"" or similar.(Source EFF)",,
+Security token,Noun,,,
+Seed,Noun,,,
+Seeding,Noun,,,
+Select,,,,
+Select Fit,,,,
+Sensitive,Adjective,,,
+Sensor,,,,
+Server,,,,
+Servers,Verb,,,
+ServiceVM,Noun,"""Service Virtual Machine""A VM the primary purpose of which
is to provide a service or services to other VMs.",,
+Setting,Noun,,,
+Settings,Noun,[Signal] [Orbot] Application menu item.,,
+Short User Manual,Noun,,,
+Signal,Noun,[Signal] Name of application. Do not translate.,,
+Size,,,,
+Slim,,,,
+Snowflake,Adjective,,,
+Socket,Noun,,,
+Software,Noun,,براÙ
ج,
+Solid State Drive,Noun,"Historically, computers stored data on rotating
magnetic discs. Mobile devices and increasing numbers of personal computers now
store permanent data on non-moving drives. These SSD drives are currently more
expensive, but much faster than magnetic storage. Unfortunately, it can be more
difficult to reliably and permanently remove data from SSD drives.
+Synonyms: SSD.
+Source EFF.",,
+Source code,Noun,,,
+Speed Boost,Noun,[Psiphon],,
+Standalone(VM),Noun,"[QubesOS] ""Standalone (Virtual Machine)""In general
terms, a VM is described as **standalone** if and only if it does not depend on
any other VM for its root filesystem.",,
+StandaloneHVM,Noun,"[QubesOS] ""Standalone Hardware Virtual Machine""Any HVM
which is standalone (i.e., does not depend on any other VM for its root
filesystem).",,
+Standard Fields,Noun,,ØÙÙÙ Ù
Ø¹ÙØ§Ø±ÙØ©,
+Sticker Pack,,,,
+Stock,,,,
+Stocks,,,,
+Street Address,,,,
+Subtitle,Noun,[Globaleaks],,
+Summary,Noun,,,
+Support,,,,
+Support Vector Machine,Noun,,,
+Sure,,,,
+Surname,Noun,,,
+Sweatshirt,,,,
+Sync Manager,Noun,,Ù
Ø¯ÙØ± اÙÙ
زاÙ
ÙØ©,
+Sys admin,Noun,,,
+System administrator,Noun,,,
+TLS,Noun,"""Transport Layer Security (TLS) and its predecessor, Secure Sockets
Layer (SSL), both frequently referred to as ""SSL"", are cryptographic
protocols that provide communications security over a computer network. Several
versions of the protocols find widespread use in applications such as web
browsing, email, Internet faxing, messaging, and voice-over-IP (VoIP).
Websites are able to use TLS to secure all communications between their servers
and web browsers."" - Wikipedia
(https://en.wikipedia.org/wiki/Transport_Layer_Security)",,
+TOFU,Noun,"Trust on first use:
+https://en.wikipedia.org/wiki/Trust_on_first_use",,
+TRIM,Noun,"[VeraCrypt] ""A trim command (known as TRIM in the ATA command set,
and UNMAP in the SCSI command set) allows an operating system to inform a
solid-state drive (SSD) which blocks of data are no longer considered in use
and can be wiped internally.""
https://en.wikipedia.org/wiki/Trim_(computing)",Ø£Ù
ر ØØ°Ù اÙÙØªÙ
Ø§ÙØºÙر Ù
Ø±ØºÙØ¨Ø©,
+TRIM command,Noun,"[VeraCrypt] ""A trim command (known as TRIM in the ATA
command set, and UNMAP in the SCSI command set) allows an operating system to
inform a solid-state drive (SSD) which blocks of data are no longer considered
in use and can be wiped internally.""
https://en.wikipedia.org/wiki/Trim_(computing)",,
+TTL,Noun,,Ù
دة ØÙاة Ø§ÙØ·Ø±Ø¯,
+Tails,Noun,Name of the organization and tool.,تÙÙØ²,
+Tails Installer,Noun,Tails = The Amnesic Incognito Live System,,
+Take a stand,,,,
+Tamanho,,,,
+TemplateBasedHVM,Noun,"[QubesOS] ""Template-Based Hardware Virtual
Machine""Any HVM that depends on a TemplateVM for its root filesystem.",,
+TemplateBasedVM,Noun,"[QubesOS] ""Template-Based Virtual Machine""Any VM which
depends on a TemplateVM for its root filesystem.",,
+TemplateHVM,Noun,"[QubesOS] ""Template Hardware Virtual Machine""Any HVM which
functions as a TemplateVM by supplying [QubesOS] its root filesystem to other
VMs.",,
+TemplateVM,Noun,"[QubesOS] ""Template Virtual Machine.""Any VM which supplies
its root filesystem to another VM.",,
+Terms & Privacy Policy,Noun,[Signal],,
+Text message,Noun,Synonym: SMS,,
+Thanks You,,,,
+Threat,Noun,"In computer security, a threat is a potential event that could
undermine your efforts to defend your data. Threats can be intentional
(conceived by attackers), or they could be accidental (you might leave your
computer turned on and unguarded). (Source EFF)",ØªÙØ¯Ùد,"""Ù٠أÙ
Ù
اÙÙÙ
بÙÙØªØ±Ø Ø§ÙØªÙØ¯ÙØ¯ ÙÙ ØØ¯Ø« Ù
Ù
ÙÙ ÙÙÙØ¶ جÙÙØ¯Ù
ÙÙ Ø§ÙØ¯Ùاع Ø¹Ù Ø¨ÙØ§ÙاتÙ. ÙÙ
ÙÙ ÙÙØªÙØ¯ÙØ¯Ø§Øª Ø£Ù
تÙÙÙ Ù
تعÙ
دة (ÙÙÙØ°Ùا Ù
ÙØ§Ø¬Ù
ÙÙ)Ø Ø£Ù ÙØ¯ تÙÙÙ
Ø¹Ø±Ø¶ÙØ© (ÙØ¯ ØªØªØ±Ù Ø¬ÙØ§Ø²Ù Ù
Ø´ØºÙØ§Ù دÙÙ Ø£Ù ØªØ±Ø§ÙØ¨Ù).""
(EFF)"
+Threat model,Verb,,,
+Threat modeling,Noun,"A way of narrowly thinking about the sorts of protection
you want for your data. It's impossible to protect against every kind of trick
or attacker, so you should concentrate on which people might want your data,
what they might want from it, and how they might get it. Coming up with a set
of possible attacks you plan to protect against is called threat modeling. Once
you have a threat model, you can conduct a risk analysis. (Synonyms: Threat
model) (Source EFF)",,
+Throwaway,Noun,"A phone that is not connected to your identity, is only used
for a small set of calls or activities, and can be discarded if and when it is
suspected of being tracked or compromised. Burner phones are often pre-paid
mobile phones bought with cash. (Synonyms: Burner phone) (Source EFF)",,
+Throwaway address,Noun,"An email address you use once, and never again. Used
to sign up to Internet services without revealing an email address connected to
your identity.
+Source EFF.",,
+Timestamp,Noun,,,
+To date though,,,,
+Toolkit,Noun,,,
+Tools,Noun,[Martus] Martus menu option.,Ø§ÙØ£Ø¯Ùات,
+Tor,Noun,[Orbot],,
+Tor Blog,,,,
+Tor Blog,Noun,,,
+Tor Bridges,Noun,,,
+Tor Browser,,,,
+Tor Browser,Noun,"[Orbot] Application Name
(https://www.torproject.org/projects/torbrowser.html.en). You can translate the
word ""Browser"", however ensure that it is translated consistently across all
resources and projects.",,
+Tor Browser Bundle,Noun,,,
+Tor Browser profile directory,Noun,,,
+Tor News,Noun,,,
+Tor Project,Noun,[Orbot] Organization name. Do not translate. Name can be
transcribed dependent on language.,,
+Tor bridge,Noun,,,
+Tor messenger,Noun,[The Tor Project],,
+Tor network,Noun,,,
+Tor relay,Noun,[Tor] [Orbot],,
+Torbutton,Noun,,,
+Touch ID,Noun,[Signal] Specific to iOS,,
+Trademark,Noun,,,
+Twitter,,,,
+Two-Factor,Noun,,,
+UI,Noun,user interface,,
+URL,Noun,,عÙÙØ§Ù,
+US $,Noun,"""USD"" or ""United States Dollar""",,
+USB drive,Noun,Specifically thumbdrives used as external storage.,,
+USB stick,Noun,,,
+UpdateVM,Noun,[QubesOS],,
+Uploaded,Adjective,[Globaleaks],,
+UsbVM,Noun,[QubesOS],,
+VM,Noun,"""virtual machine""",,
+VPN,Noun,"A virtual private network is a method for connecting your computer
securely to the network of an organization on the other side of the Internet.
When you use a VPN, all of your computer's Internet communications is packaged
together, encrypted and then relayed to this other organization, where it is
decrypted, unpacked, and then sent on to its destination. To the organization's
network, or any other computer on the wider Internet, it looks like your
computer's request is coming from inside the organization, not from your
location. VPNs are used by businesses to provide secure access to internal
resources (like file servers or printers). They are also used by individuals to
bypass local censorship, or defeat local surveillance.
+Synonyms: Virtual Private Network
+Source: EFF",,
+Vanilla Bridges,Noun,,,
+Vidalia,Noun,,,
+Virtual Machine (VM),Noun,"A software implementation of a machine (for
example, a computer) which executes programs like a physical machine.",,
+Virtual Private Network (VPN),Noun,"A virtual private network is a method for
connecting your computer securely to the network of an organization on the
other side of the Internet. When you use a VPN, all of your computer's Internet
communications is packaged together, encrypted and then relayed to this other
organization, where it is decrypted, unpacked, and then sent on to its
destination. To the organization's network, or any other computer on the wider
Internet, it looks like your computer's request is coming from inside the
organization, not from your location. VPNs are used by businesses to provide
secure access to internal resources (like file servers or printers). They are
also used by individuals to bypass local censorship, or defeat local
surveillance. (Synonyms: VPN) (Source: EFF)",,
+"Virtual Private Network, VPN",Noun,"[Orbot] A virtual private network is a
method for connecting your computer securely to the network of an organization
on the other side of the Internet. When you use a VPN, all of your computer's
Internet communications is packaged together, encrypted and then relayed to
this other organization, where it is decrypted, unpacked, and then sent on to
its destination. To the organization's network, or any other computer on the
wider Internet, it looks like your computer's request is coming from inside the
organization, not from your location. VPNs are used by businesses to provide
secure access to internal resources (like file servers or printers). They are
also used by individuals to bypass local censorship, or defeat local
surveillance. (Synonyms: Virtual Private Network) (Source: EFF)",,
+Virtual Private Server (VPS),Noun,Virtual Private Server,,
+VoIP Call,Noun,,,
+Voice over IP (VoIP),Noun,"Any technology that allows you to use the Internet
for voice communication with other VoIP users or receive telephone calls over
the Internet.
+Synonyms: VoIP.
+Source EFF.",Ø§ÙØµÙت عبر Ù
ÙØ«Ø§Ù Ø§ÙØ¥ÙØªØ±ÙØª,Ø£Ù
تÙÙÙÙÙØ¬Ùا تسÙ
Ø Ù٠باستخداÙ
Ø§ÙØ¥ÙØªØ±ÙØª
ÙÙØªÙØ§ØµÙ Ø§ÙØµÙت٠Ù
ع Ù
ستخدÙ
Ù VoIP Ø§ÙØ¢Ø®Ø±Ù٠أÙ
تÙÙÙ Ø§ÙØ§ØªØµØ§Ùات اÙÙØ§ØªÙÙØ© عبر Ø§ÙØ¥ÙØªØ±ÙØª.
+WAN,Noun,,,
+Warning!,Interjection,ex: âWarning! Selecting 'OK' will permanently delete
all filesâ,,
+WebApp,Noun,,,
+Welcome,Noun,,,
+WhisperBack,Noun,,,
+WiFi,Noun,,,
+Windows,Noun,Operating system,,
+Work,Verb,,,
+World Wide Web,Noun,,,
+XMPP,Noun,"Copy of data, updated regularly or not, in order to allow
restoration in case of data loss.
+It can be stored locally, on the cloud or on a removable medium such as an
optical disk or USB drive. This last option allows backups to be stored away
safely. [Signal]",XMPP,Ù
Ø¹ÙØ§Ø± Ù
ÙØªÙØ ÙÙØªØ±Ø§Ø³Ù اÙÙ
باشر -
ÙØ§Ù ÙØ³ØªØ®Ø¯Ù
Ù ÙÙ Ù
Ù Google ÙÙÙØ³Ø¨ÙÙ ÙÙÙÙÙÙ
ا
تÙÙÙØ§. ÙÙÙØ§Ù خدÙ
ات ÙÙØªØ±Ø§Ø³Ù اÙÙ
باشر اÙÙ
ستÙÙØ© ÙØ§Ùت٠عادة Ù
ا تستخدÙ
XMPP. ÙØ§ÙخدÙ
ات Ù
Ø«Ù
Whatsapp ÙÙØ§ Ø¨Ø±ÙØªÙÙÙÙØ§ØªÙا Ø§ÙØ®Ø§ØµØ© ÙØ§Ùت٠تÙÙÙ Ù
غÙÙØ© ÙØ³Ø±ÙØ©.
+XSS,Noun,,,
+XXL,Noun,Extra extra large. Clothing size.,,
+YYYY,Noun,âYearâ Indicates that user must input a 4-digit year (ex: 1990),,
+Zip,Noun,Abbreviation of 'Zip Code' or 'Postal Code',,
+about,Preposition,"[Globaleaks] As in, the âAboutâ section of a website or
application.",بشأÙ,
+academic,,,,
+accept,Verb,[Signal],ÙØ¨ÙÙ,
+access,Noun,,اÙÙØµÙÙ,
+access,Verb,,ÙØµÙÙ,
+access mode,Noun,,ÙØ¶Ø¹ اÙÙØµÙÙ,
+access token,Noun,"[Martus]
+Short identification number used to add Contacts to your Martus
account.",شارة اÙÙØµÙÙ,
+accessibility,Noun,,,
+account,Noun,,Ø§ÙØØ³Ø§Ø¨,
+account recovery,Noun,,استعادة Ø§ÙØØ³Ø§Ø¨,
+account recovery code,Noun,,رÙ
ز استعادة Ø§ÙØØ³Ø§Ø¨,
+accountability,Noun,,اÙÙ
Ø³Ø§Ø¦ÙØ©,
+accounting,,,,
+acknowledge,Verb,"An acknowledgment in Peerio is similar to a message, but
sends a ""thumbs up"" icon with no additional text. The thumbs-up icon is
referred to as an ""acknowledgment""",Ù
ÙÙÙÙ
,
+acknowledged,Adjective,"An acknowledgment in Peerio is similar to a message,
but sends a ""thumbs up"" icon with no additional text. The thumbs-up icon is
referred to as an ""acknowledgment""",ÙØ§ÙÙ
,
+acknowledgment,Noun,"American English â A button in Peerio that functions
similar to a message, but sends a ""thumbs up"" icon with a timestamp. The
thumbs-up icon is referred to as an ""acknowledgment""",,
+acquire,Verb,,ÙÙØªØ³Ø¨,
+activate,Verb,[Orbot],,
+active,Adjective,,ÙØ´ÙØ·,
+activists,,,,
+activity,,,,
+activity,Noun,,اÙÙØ´Ø§Ø·,
+ad provider,Noun,[Psiphon 3],,
+ad-blocker,Noun,,ØØ§Ø¬Ø¨ Ø¥Ø¹ÙØ§Ùات,
+add,Verb,,Ø¥Ø¶Ø§ÙØ©,
+add-on,Noun,"A piece of software that modifies another software application,
changing how it works or what it can do. Often add-ons can add privacy or
security features to web browsers or email software. Some add-ons are malware,
so be careful to install only those that are reputable and from official
sources. (Synonyms: extensions, plugins) (Source: EFF)",Ø§ÙØ¥Ø¶Ø§ÙØ©,
+add-ons,Noun,,,
+added,Adjective,,,
+address,Noun,,عÙÙØ§Ù,
+address,Verb,"(1) To address a situation
+Synonyms: to fix, to take care of
+
+(2) Give to data or a data set an address in memory
+
+(3) If a letter, envelope, or parcel is addressed to you, your name and
address have been written on it.",,
+address bar,Noun,,Ø´Ø±ÙØ· Ø§ÙØ¹ÙÙØ§Ù,
+address book,Noun,,دÙÙÙ Ø§ÙØ¹ÙاÙÙÙ,
+admin,Noun,,,
+administrative,,,,
+administrators,Noun,,,
+advance,,,,
+advanced,Adjective,,Ù
ØªÙØ¯Ù
,
+advanced,Noun,it is a noun?,اÙÙ
ØªÙØ¯Ù
Ø©,
+advanced search,Noun,[Martus],Ø§ÙØ¨ØØ« اÙÙ
ØªÙØ¯Ù
,
+advanced user,Noun,,,
+adversary,Noun,"Your adversary is the person or organization attempting to
undermine your security goals. Adversaries can be different, depending on the
situation. For instance, you may worry about criminals spying on the network at
a cafe, or your classmates at a school. Often the adversary is hypothetical.
+Source EFF.",,
+agenda notes,Noun,,,
+agent,Noun,,اÙÙÙÙÙ,
+air gap,Noun,"A computer or network that is physically isolated from all other
networks, including the Internet, is said to be air-gapped.
+Source EFF.
+
+An air gap, air wall or air gapping is a network security measure employed on
one or more computers to ensure that a secure computer network is physically
isolated from unsecured networks, such as the public Internet or an unsecured
local area network. The name arises from the technique of creating a network
that is physically separated from all other networks.
+Source Wikipedia",ÙØ¬ÙØ© ÙÙØ§Ø¡,
+air-gapped (air gapped),Adjective,,,
+airline miles,,,,
+airlines miles,,,,
+alpha,Noun,,ØºÙØ± Ù
Ø³ØªÙØ±,
+alternate,Adjective,,,
+alternate,Noun,,,
+alternative,Adjective,,Ø§ÙØ¨Ø¯ÙÙ,
+alternative,Noun,,Ø§ÙØ¨Ø¯ÙÙ,
+ambiguous,Adjective,,غاÙ
ض,
+and/or,Conjunction,,Ù/Ø£Ù,
+anomaly,Noun,[Globaleaks],,
+anonymity,,,,
+anonymity,Noun,[Orbot],Ø§ÙØªØ®ÙÙ,
+anonymization,Noun,"""It is the process of either encrypting or removing
personally identifiable information from data sets, so that the people whom the
data describe remain anonymous."" (Source:
https://en.wikipedia.org/wiki/Data_anonymization)",Ø¥Ø®ÙØ§Ø¡ اÙÙÙÙØ©,
+anonymize,Verb,"[Orbot] To encrypt or remove personally identifiable
information from data sets, so that the people whom the data describe remain
anonymous. (Source: https://en.wikipedia.org/wiki/Data_anonymization)
[Signal]",Ø¥Ø®ÙØ§Ø¡ اÙÙÙÙØ©,
+anonymizing,,,,
+anonymous,,,,
+anonymous,Adjective,[Orbot],Ù
جÙÙÙ,
+anonymously,,,,
+anti-censorship,,,,
+antivirus,Noun,"Software that attempts to protect a device from being taken
over by malicious software (or âmalware""). Viruses were some of the first
and most prevalent forms of malware; they were named viruses to reflect the way
they would spread from device to device. These days most antivirus software
concentrate on warning you if you look to be downloading a suspicious file from
an external source, and examining files on your computer to see if they match
the software's idea of what malware looks like.
+Anti-virus software can only recognize malware if it is substantially similar
to samples that the anti-virus developer has already analyzed. This makes it
far less effective at combating targeted malware designed to infiltrate a
particular community or person, rather than more widespread strains of malware.
Some advanced malware can also actively attack or conceal itself from antivirus
software.
+Source EFF.",Ù
ضاد ÙÙØ±Ùسات,
+anyone,,,,
+app,Noun,"[Orbot] Abbreviation of ""application."" (Synonyms:
application)",تطبÙÙ,
+app switcher,Noun,[Signal] Specific to iOS,,
+application,Noun,"[Orbot] An application program (app or application for
short) is a computer program designed to perform a group of coordinated
functions, tasks, or activities for the benefit of the user. (Source:
https://en.wikipedia.org/wiki/Application_software) [Signal]",تطبÙÙ,
+apply,Verb,,تطبÙÙ,
+appreciates,,,,
+approach,Noun,,Ù
ÙÙØ¬ÙØ©,
+approve,Verb,,ÙÙØ§ÙÙ,
+archive,Noun,"An archive file is a file that is composed of one or more
computer files along with metadata. Archive files are used to collect multiple
data files together into a single file for easier portability and storage, or
simply to compress files to use less storage space.
+https://en.wikipedia.org/wiki/Archive_file",Ø§ÙØ£Ø±Ø´ÙÙ,"the noun Archive
in English is translated to the Arabic word ""آرشÙÙ"" while the verb
Archive translates to the Arabic verb ""Ø£Ø±Ø´ÙØ©"""
+archive,Verb,[Signal],Ø£Ø±Ø´ÙØ©,
+argument,Noun,,,
+arrive,Verb,,ÙØµÙ,
+article,Noun,,Ù
ÙØ§Ù,
+as root,Noun,,,
+asset,Noun,"In threat modeling, any piece of data or a device that needs to be
protected.
+Source EFF.",أصÙÙ,ÙÙ ÙÙ
ذجة Ø§ÙØ®Ø·Ø±Ø ÙÙ Ø£Ù Ø¨ÙØ§Ùات Ø£Ù
Ø£Ø¬ÙØ²Ø© ÙØªÙجب ØÙ
Ø§ÙØªÙا.
+asymmetric-key encryption,Noun,"Traditional encryption systems use the same
secret, or key, to encrypt and decrypt a message. So if I encrypted a file with
the password ""bluetonicmonster"", you would need both the file and the secret
""bluetonicmonster"" to decode it. Public key encryption uses two keys: one to
encrypt, and another to decrypt. This has all kinds of useful consequences. For
one, it means that you can hand out the key to encrypt messages to you, and as
long as you keep the other key secret, anyone with that key can talk to you
securely. The key you hand out widely is known as the ""public key"": hence the
name of the technique. Public key encryption is used to encrypt email and files
by Pretty Good Privacy (PGP), OTR for messaging, and SSL/TLS for web browsing.
+Synonyms: Public key encryption, Public key cryptography. (Source EFF)",,
+at the Heart of Internet Freedom,,,,
+attach,Verb,To attach a file to a message,Ø¥Ø±ÙØ§Ù,
+attachment,Noun,[Signal] File sent together with an email or other electronic
message.,Ù
ÙÙ Ù
رÙÙ,
+attack,Noun,"In computer security, an attack is a method that can be used to
compromise security, or its actual use. An attacker is the person or
organization using an attack. An attack method is sometimes called an
""exploit.""
+Source EFF.",,
+attacker,Noun,,Ù
ÙØ§Ø¬Ù
,
+audio,Adjective,[Signal],,
+audio,Noun,,ØµÙØª,
+auth token,Noun,[Orbot],,
+authenticate,Verb,,ÙØ«ÙÙ,
+authenticated,Adjective,,Ù
ÙÙØ«ÙÙ,
+authentication,Noun,[Signal],,
+authentication ,Noun,[Signal],Ø§ÙØªÙØ«ÙÙ,
+author,Noun,,اÙÙ
ؤÙÙ,
+authorize,Verb,,إسÙ
Ø,
+automated traffic,Noun,,,
+autonomous system number,Noun,,,
+availability,,,,
+availability,Noun,,,
+available,Adjective,,Ù
تÙÙØ±,
+avatar,Noun,"A computer generated visual icon used as an alternative digital
fingerprint. aka ""identicon"". [Signal]",Ø§ÙØµÙرة Ø§ÙØ±Ù
Ø²ÙØ©,
+back,,,,
+back,Noun,As in âBackâ button,Ø±Ø¬ÙØ¹,
+back,Verb,,,
+back up,Verb,,ÙØ³Ø® Ø§ØØªÙاطÙ,
+background,Noun,Screen surface where text and graphic elements are
displayed,Ø§ÙØ®ÙÙÙØ©,
+backlog,Noun,Delayed processing of some sort,,
+backup,Noun,"[Signal] [Orbot] Copy of data, updated regularly or not, in order
to allow restoration in case of data loss.
+It can be stored locally, on the cloud or on a removable medium such as an
optical disk or USB drive. This last option allows backups to be stored away
safely.",ÙØ³Ø®Ø© Ø§ÙØ§ØØªÙاط,
+badge,Noun,[Signal],,
+balance,Noun,What is left to be paid or recovered.,,
+bandwidth,Noun,[Orbot],سعة اÙÙÙÙ,
+bank fees,,,,
+bar,Noun,,Ø´Ø±ÙØ·,
+bar chart,Noun,,Ù
خطط بأعÙ
دة,
+bare-metal,Adjective,,,
+base,,,,
+batch select,Noun,[Signal],,
+battery,Noun,,,
+be careful,,,,
+best-effort delivery,Noun,,,
+beta,Noun,,شب٠Ù
Ø³ØªÙØ±,
+big data,Noun,,Ø§ÙØ¨ÙØ§ÙØ§Øª اÙÙØ¨Ùرة,
+billing,,,,
+binaries,Noun,,Ø«ÙØ§Ø¦ÙÙØ§Øª,
+binary,Noun,"Binary file.
+8-bit encoded data file using only 0 and 1, different from ASCII which is
7-bit encoded.",Ø«ÙØ§Ø¦ÙÙ,
+block,,,,
+block,Noun,,ÙØªÙØ©,
+block,Verb,[Signal],ØØ¬Ø¨,
+blocked,Adjective,,Ù
ØØ¬Ùب,
+blocked access,Noun,,ÙØµÙÙ Ù
ØØ¬Ùب,
+blockfile,Noun,[I2P] http://www.i2p2.de/blockfile.html,,
+blocking,Noun,"Synonyms: filtering, censoring Internet traffic.",,
+blocking resistant,Adjective,,Ù
ÙØ§ÙÙ
ÙÙØØ¬Ø¨,
+blog,Noun,,اÙÙ
دÙÙØ©,
+blog post,Noun,"Short text posted to a blog, the content of which is left
entirely to the discretion of the author.",,
+blogging,Noun,Posting to a blog and updating it regularly.,,
+body,Noun,,جسÙ
,
+bookmark,Noun,,Ø¹ÙØ§Ù
Ø© Ù
Ø±Ø¬Ø¹ÙØ©,
+boolean,Adjective,,اÙÙÙÙ
اÙÙ
ÙØ·ÙÙØ©,
+boolean,Noun,,اÙÙÙÙ
اÙÙ
ÙØ·ÙÙØ©,
+boot,Noun,[Orbot],,
+boot,Verb,[Orbot],تÙ
ÙÙØ¯,
+bootable,Adjective,,ÙØ§Ø¨Ù ÙÙØªÙ
ÙÙØ¯,
+bootloader,Noun,,Ù
ØÙ
Ù Ø§ÙØªÙ
ÙÙØ¯,
+bot,Noun,,,
+botnet,Noun,,,
+bounce,Verb,,,
+bouncing,,,,
+bounty,Noun,,جائزة,
+box,Noun,,ØµÙØ¯ÙÙ,
+break in,Noun,,ÙÙØªØÙ
,
+bridge,Noun,[Orbot] [Tor],Ø¬ÙØ³Ùر,
+bridge,Verb,[Tor],ØªØ¬Ø³ÙØ±,
+bridge line,Noun,[Tor] a line with the bridge configuration,خط Ø§ÙØ¬Ø³Ø±,
+bridge relay,Noun,[Tor],,
+bridge type,Noun,[Tor],ÙÙØ¹ Ø§ÙØ¬ÙØ³ÙØ±,
+bridges,Noun,,,
+broad range,,,,
+broadcast,Verb,[Signal],,
+browse,Verb,[Orbot],ØªØµÙØ,
+browser,,,,
+browser,Noun,web browser,Ù
ØªØµÙØ,
+browser fingerprint,Noun,"The various properties of your web browser or
computer that a web site can notice when you visit. They may be slightly
different from other browsers or computers, which can be a way to recognize you
even if you didn't log in, even if your computer doesn't save cookies, and even
if you connect to the Internet from a different network in the future. For
example, you might be the only person who uses a particular site from a device
set to a particular language, with a particular screen size, and using a
particular web browser version; then the site could realize that it's you
whenever you visit, even if you don't do anything to reveal your identity.
+Source EFF.",,
+browsing,,,,
+buffer,Noun,,,
+bug,Noun,,خطأ,
+bug report,Noun,[Signal],Ø§ÙØ¥Ø¨Ùاغ Ø¹Ù Ø§ÙØ®Ø·Ø£,
+bundle,Noun,,,
+bundled,Adjective,,,
+burden,,,,
+burden,Noun,,,
+burner phone,Noun,"A phone that is not connected to your identity, is only
used for a small set of calls or activities, and can be discarded if and when
it is suspected of being tracked or compromised. Burner phones are often
pre-paid mobile phones bought with cash. (Synonyms: Throwaway)
+(Source: EFF)",,
+button,Noun,,زر,
+by,Adverb,,,
+bypass,Verb,,تخطÙ,
+bytes,Noun,[Globaleaks],,
+cache,Noun,,Ù
خبأ,
+cache,Verb,,خبأ,
+cache-busting,Noun,,,
+calendar,Noun,,Ø§ÙØªÙÙÙÙ
,
+camera,Noun,,,
+cams,,,,
+cams,Noun,,,
+can,Verb,,,
+cancel,Verb,[Signal],Ø¥ÙØºØ§Ø¡,
+cannot,Verb,,,
+capability,Noun,"The capability of an attacker (in the context of an attack)
is what it is able to do to achieve its aims. For example, a country's security
services might have the capability to listen to telephone calls while a
neighbor may have the capability to watch you from their window. To say that an
attacker âhas"" a capability does not mean that they will necessarily use
that capability. It does mean that you should consider and prepare for the
possibility.
+Source EFF.",,
+car documents,Noun,[Umbrella],,
+card number,Noun,,,
+carjacking,Noun,,,
+carry,,,,
+carry,Verb,,,
+case management,Noun,[GlobaLeaks],,
+cash,,,,
+cash,Noun,,,
+cc,Noun,âcarbon copyâ,,
+censor,,,,
+censor,Noun,,,
+censored,,,,
+censored,Adjective,,,
+censorship,,,,
+censorship,Noun,[Signal],,
+cerificate,,,,
+certificate,Noun,,Ø´ÙØ§Ø¯Ø©,
+certificate,Verb,To give a certificate,ÙØ¹Ø·Ù Ø´ÙØ§Ø¯Ø©,
+certificate authority,Noun,,,
+certificate chain,Noun,[Globaleaks],Ø³ÙØ³ÙØ© Ø§ÙØªØµØ¯ÙÙ,
+certificate chain file,Noun,[Globaleaks],,
+certificates,Noun,"Is it needed, the plural form defined here? The singular
already exists.",Ø§ÙØ´Ùادات,
+chain,Noun,,Ø³ÙØ³ÙØ©,
+change,Verb,,,
+change log,Noun,,Ø³Ø¬Ù Ø§ÙØªØºÙÙØ±,
+charges,,,,
+charges,Noun,,,
+chart,Noun,,Ù
خطط,
+chat,Noun,[Signal],دردشة,
+chat,Verb,[Signal],,
+check,Verb,,تØÙÙ,
+checking,,,,
+checkpoint,Noun,,,
+checksum,Noun,,,
+choke,Verb,,,
+chokepoint,Noun,,,
+choker,Noun,,,
+choose,Verb,,,
+choose ,Verb,,إختر,
+chronic stress,Noun,,,
+cipher,Noun,,,
+ciphertext,Noun,,ÙØµ Ù
ÙØ¹Ù
ÙÙÙ,
+circuit,Noun,[Orbot],,
+circuits,,,,
+circuits,Noun,,,
+circumvent,Verb,[Orbot],ÙØªØØ§ÙÙ,
+circumvention,Noun,[Signal] [Orbot],ØªØØ§ÙÙ,
+clear,Verb,[Signal] [Orbot],ÙØ¸Ù,
+cleartext,Noun,,ÙØµ ØµÙØ±Ù,
+click,Noun,,اÙÙÙØ±,
+click,Verb,[Signal],Ø¥ÙÙØ±,
+click and hold,Verb,,Ø¥ÙÙØ± Ù
ع Ø§ÙØ¥Ø³ØªÙ
رار,
+clickjacking attack,Noun,,ÙØ¬ÙÙ
عبر تغÙÙØ± ÙØ¬ÙØ© اÙÙÙØ±,
+client,Noun,"[Signal] [Orbot] As in ""desktop client"" or ""Android
client.""",عÙ
ÙÙ,
+clipboard,Noun,[Signal],Ø§ÙØØ§ÙØ¸Ø©,
+clock skew,Noun,,,
+close,Verb,,أغÙÙ,
+cloud,,,,
+cloud server,Noun,[Orbot],,
+cloud storage,Noun,,Ø³ØØ§Ø¨Ø© Ø§ÙØªØ®Ø²ÙÙ,
+coarse data,Noun,Unprocessed data,,
+code,Noun,,رÙ
ز,
+codec,Noun,,Ù
رÙ
ز,
+collected,,,,
+collection,,,,
+collection,Noun,,,
+collusion,Noun,,Ù
ؤاÙ
رة,
+collusion attack,Noun,,,
+color,Noun,,اÙÙÙÙ,
+column,Noun,,Ø§ÙØ¹Ù
ÙØ¯,
+command,Noun,,Ø§ÙØ£Ù
ر,
+command and control server,Noun,"A command and control server (C&C or C2) is a
computer that gives orders to malware-infected devices and receives information
from those devices. Some C&C servers control millions of devices.
+Synonyms: C&C, C2.
+Source EFF.",,
+command line,Noun,,سطر Ø§ÙØ£ÙاÙ
ر,
+comment,Noun,[Globaleaks],,
+commercial VPN,Noun,"A commercial Virtual Private Network is a private service
that offers to securely relay your Internet communications via their own
network. The advantage of this is that all of the data you send and receive is
hidden from local networks, so it is safer from nearby criminals, or untrusted
local ISPs or cybercafes. A VPN may be hosted in a foreign country, which is
useful both for protecting communications from a local government, and
bypassing national censorship. The down side is that most of the traffic is
decrypted at the commercial VPN's end. That means you need to trust the
commercial VPN (and the country where it is located) not to snoop on your
traffic.
+Source EFF.",,
+communicate,Verb,,ØªÙØ§ØµÙ,
+communication,,,,
+communication,Noun,,ØªÙØ§ØµÙ,
+community,,,,
+community,Noun,,اÙÙ
جتÙ
ع,
+community center,Noun,,Ù
Ø±ÙØ² اÙÙ
جتÙ
ع,
+companies,,,,
+compartmentalization,Noun,,ØªÙØ³ÙÙ
,
+compartmentalize,Verb,,تجزئة,
+compatible,Adjective,,Ù
ØªÙØ§ÙÙ,
+complete,Verb,,Ø¥ÙÙ
Ù,
+completed,Adjective,,Ù
ÙÙØªÙ
Ù,
+compose,Verb,[Signal],,
+compressed,Adjective,,Ù
Ø¶ØºÙØ·,
+compression,Noun,,ضغط,
+compression/decompression tool,Noun,,اداة ضغط/Ø¥ÙØºØ§Ø¡ Ø§ÙØ¶ØºØ·,
+compromise,Verb,,ÙÙØªÙÙ,
+compromised,Noun,[Globaleaks],,
+computer,Noun,[Signal],ØØ§Ø³Ùب,
+concern,,,,
+concordance,Noun,,Ø§ÙØ³Ø¬Ø§Ù
,
+conference,Noun,,Ù
ؤتÙ
ر,
+conferences,,,,
+confidentiality,Adjective,[Globaleaks] [Orbot],,
+configuration,Noun,[Globaleaks] [Orbot],تÙÙØ¦Ø©,
+configure,Verb,[Signal] [Orbot],اضبط,
+confirm,Verb,,,
+connect,Verb,[Signal],,
+connecting,Verb,,,
+connection,,,,
+connection,Noun,[Orbot],Ø§ÙØ§ØªØµØ§Ù,
+consensus,Noun,,إجÙ
اع,
+constraint,Noun,,ÙÙÙØ¯,
+contact,Noun,[Signal] [Martus] Another Martus user with whom you can share
your Martus bulletins.,Ø¬ÙØ© اتصاÙ,
+contact info,Noun,,,
+contact information,Noun,,,
+contact request,Noun,,Ø·ÙØ¨ Ø§ÙØªÙاصÙ,
+content,Noun,,اÙÙ
ØØªÙÙ,
+context,Noun,"[Globaleaks] Tips are classifies in contexts, e.g. corruption",,
+control panel,Noun,,ÙÙØØ© Ø§ÙØªØÙÙ
,
+control port,Noun,,Ù
ÙÙØ° Ø§ÙØªØÙÙ
,
+conventional,Adjective,,تÙÙÙØ¯Ù,
+conversation,Noun,"A ""conversation"" is the same as a message ""thread""
[Signal]",Ù
ØØ§Ø¯Ø«Ø©,
+cookie,Noun,"[Orbot] Cookies are a web technology that let websites recognize
your browser. Cookies were originally designed to allow sites to offer online
shopping carts, save preferences or keep you logged on to a site. They also
enable tracking and profiling so sites can recognize you and learn more about
where you go, which devices you use, and what you are interested in â even if
you don't have an account with that site, or aren't logged in. (Source : EFF)",,
+cookies,Noun,,,
+copy,Verb,,ÙØ³Ø®,
+corporate foundation,,,,
+corporate intranet,Noun,"Companies and other large institutions will usually
have some services (email, web, and access to files and printers for instance)
that are accessible from within their own local network, but not from outside
on the wider Internet. Most companies take this as being sufficient security to
protect their internal documents, but this means that any attack that can
connect to the intranet can access or interfere with all the information being
kept locally. An example of such an attack is tricking an employee to install
malware on their laptop. To allow employees to access the intranet via the
wider Internet, companies will often provide their own Virtual Private Network
(VPN) which creates a secure connection to the inside of the intranet from
anywhere in the world.
+Source EFF.",Ø¥ÙØªØ±Ø§Ùت Ø´Ø±ÙØ©,"تÙ
ÙÙ Ø§ÙØ´Ø±Ùات ÙØºÙØ±ÙØ§ Ù
٠اÙÙ
ؤسسات Ø§ÙØ¶Ø®Ù
Ø© عادة بعض Ø§ÙØ®Ø¯Ù
ات (Ø¥ÙÙ
ÙÙØ
Ø´Ø¨ÙØ©Ø ÙÙØµÙ٠إÙ٠اÙÙ
ÙÙØ§Øª ÙØ§Ùطابعات Ù
Ø«ÙØ§Ù) ÙÙ
Ù٠اÙÙØµÙ٠إÙÙÙØ§ Ù
Ù Ø´Ø¨ÙØªÙا اÙÙ
ØÙÙØ©Ø ÙÙÙÙ ÙÙØ³
Ù
Ù Ø§ÙØ®Ø§Ø±Ø¬ عÙÙ Ø§ÙØ¥ÙØªØ±ÙØª بشÙ٠عاÙ
. ØªÙØªÙÙ Ø£ØºÙØ¨
Ø§ÙØ´Ø±Ùات بذÙÙ ÙØÙ
Ø§ÙØ© Ø£Ù
Ù Ù
Ø³ØªÙØ¯Ø§ØªÙا
Ø§ÙØ¯Ø§Ø®ÙÙØ©Ø ÙÙÙÙ ÙØ°Ø§ ÙØ¹ÙÙ Ø£Ù Ø£Ù ÙØ¬ÙÙ
ÙÙ
ÙÙÙ
Ø§ÙØ§ØªØµØ§Ù Ø¨Ø´Ø¨ÙØ© Ø¥ÙØªØ±Ø§Ùت Ø§ÙØ¯Ø§Ø®ÙÙØ© ÙÙ
ÙÙÙ
اÙÙØµÙÙ Ø£Ù Ø§ÙØ¹Ø¨Ø« بجÙ
ÙØ¹ اÙÙ
عÙÙÙ
ات اÙÙ
ØÙÙØ¸Ø© Ù
ØÙÙØ§Ù. Ù
Ø«ÙØ§Ù: خداع Ø£ØØ¯ اÙÙ
ÙØ¸ÙÙÙ ÙØªØ«Ø¨Ùت برÙ
Ø¬ÙØ§Øª Ø®Ø¨ÙØ«Ø© عÙÙ Ø¬ÙØ§Ø²Ù. ÙÙØ³Ù
Ø§Ø ÙØ¬Ù
ÙØ¹ اÙÙ
ÙØ¸ÙÙÙ
باÙÙØµÙ٠إÙÙ Ø§ÙØ´Ø¨ÙØ© Ø§ÙØ¯Ø§Ø®ÙÙØ© ""Ø¥ÙØªØ±Ø§Ùت"" Ù
Ù
Ø§ÙØ¥ÙØªØ±ÙØªØ ØºØ§ÙØ¨Ø§Ù Ù
ا ØªÙØ¯Ù
Ø§ÙØ´Ø±Ùات Ø´Ø¨ÙØ©
Ø§ÙØªØ±Ø§Ø¶ÙØ© Ø
®Ø§ØµØ© ØªÙØ´Ø¦ Ø§ØªØµØ§ÙØ§Ù Ø¢Ù
ÙØ§Ù Ø¨Ø§ÙØ´Ø¨ÙØ© Ø§ÙØ¯Ø§Ø®ÙÙØ© Ù
٠أ٠Ù
ÙØ§Ù ÙÙ Ø§ÙØ¹Ø§ÙÙ
."
+country,,,,
+crack,,,,
+crash,Noun,,,
+crash report,Noun,,,
+create,Verb,,,
+credentials,Noun,,Ø§ÙØ¥Ø¹ØªÙ
ادات,
+credit card,,,,
+credits,Noun,,ائتÙ
Ø§ÙØ§Øª,
+critical,,,,
+cropping,Noun,,,
+cross-certification,Noun,,,
+crucial,Adjective,,ØØ§Ø³Ù
Ø©,
+cryptocurrency,Noun,,عÙ
ÙØ© Ù
عÙ
اة,
+cryptographers,,,,
+cryptographic signature,Noun,"The use of a mathematical technique to confirm
the origin of information, and to confirm that it wasn't changed since it was
written. Digital signatures may be used with software downloads to make sure
that the software you're installing is the same as the official published
version, and that nobody has tampered with it. They're also often used on
encrypted email and for many other purposes. When information isn't protected
by a digital signature, an Internet service provider or other communications
provider could change the contents of what someone wrote or published, and
there wouldn't be a technical means to detect that this happened.
+Synonyms: digital Signature
+Source EFF.",,
+cryptography,Noun,"The art of designing secret codes or ciphers that let you
send and receive messages to a recipient without others being able to
understand the message.
+Source EFF.",,
+cryptoparty,Noun,"When you're using public key encryption, it's important to
be sure that the key you use to encrypt a message really belongs to the
recipient (see key verification). PGP makes this a little easier by having a
way to tell others ""I believe this key belongs to this person -- and if you
trust me, you should believe that too."" Telling the world that you trust
someone's key is called ""signing their key"": it means anyone who uses that
key can see you vouched for it. To encourage everyone to check and sign each
others keys, PGP users organize key-signing parties. They're almost, but not
quite, as exciting as they sound.
+Analogy: It's like a networking party, where you introduce your friends to
other friends.
+Synonyms: key-signing party.
+Source EFF.",,
+"crÃtico, crÃticos, de segurança pessoal da informação",,,,
+current,Adjective,,,
+currently,,,,
+curriculum for trainers,Noun,,,
+custidoan,Noun,,,
+custodian,Noun,[Globaleaks],,
+custom,Adjective,,Ù
خصص,
+customer support,Noun,,خدÙ
Ø© Ø§ÙØ¹Ù
ÙØ§Ø¡,
+customization,Noun,[Globaleaks],Ø§ÙØªØ®ØµÙص,
+customize,Verb,,خصÙÙØµ,
+cut,Verb,,ÙØµ,
+daemon,Noun,,Ø§ÙØ¹ÙØ±ÙØª,
+dashboard,Noun,,ÙÙØØ© Ø§ÙØªØÙÙ
,
+data,Noun,[Signal] [Orbot],Ø¨ÙØ§Ùات,
+data package,Noun,,ØØ²Ù
Ø© Ø¨ÙØ§Ùات,
+data retention,Noun,,,
+data storage,Noun,,,
+data-Driven Dropdown (Field),Noun,[Martus],,
+database,Noun,[Signal],,
+datastore,Noun,http://en.wikipedia.org/wiki/Datastore_network,Ù
خزÙ
Ø§ÙØ¨ÙØ§ÙØ§Øª,
+date range,Noun,,,
+day,Noun,,اÙÙÙÙ
,
+deactivate,Verb,[Orbot],,
+debit,,,,
+debriefing,Noun,,,
+debug,Verb,,ÙØµØØ,
+debug log,Noun,[Signal],,
+debug mode,Noun,,ÙØ¶Ø¹ Ø§ÙØªØµØÙØ,
+debugging,Noun,,,
+deck,Noun,[Ooniprobe] This is a collection of ooniprobe tests and inputs.,,
+decline,Verb,"[Signal] To reject. As in ""Decline an incoming call.""",,
+declined,Verb,,,
+decompression,Noun,,Ø¥ÙØºØ§Ø¡ Ø§ÙØ¶ØºØ·,
+decorating,,,,
+decrypt,Verb,[Orbot] Cryptography is the process of encryption and decryption
of data. [Signal],ÙÙ Ø§ÙØªØ¹Ù
ÙØ©,
+decrypted,Adjective,[Signal],ÙÙÙÙÙØª تعÙ
ÙØªÙ,
+decryption,Noun,[Orbot],ÙÙ Ø§ÙØªØ¹Ù
ÙØ©,
+dedicated server,Noun,[Globaleaks],خادÙ
Ù
خصص,
+deductible,,,,
+deepending,Adjective,,,
+default,Adjective,[Globaleaks] [Signal] [Orbot],Ø§ÙØ§ÙتراضÙ,
+default,Noun,[Orbot],Ø§ÙØ§ÙتراضÙ,
+default server,Noun,,خادÙ
Ø§ÙØªØ±Ø§Ø¶Ù,
+defenders,,,,
+delay,Noun,,Ø§ÙØªØ£Ø®Ùر,
+delete,Verb,[Globaleaks] [Signal],ØØ°Ù,
+deleted,Adjective,,ØÙذÙ,
+deletion,Noun,[Globaleaks],,
+deprecated,Adjective,,,
+descriptor,Noun,"Identification item for a file, a program or a data.",,
+deselect,Verb,,,
+desktop,Noun,[Signal],Ø³Ø·Ø Ø§ÙÙ
ÙØªØ¨,
+destroy,Verb,Removes message/file from the entire Peerio server and all users'
accounts,أتÙÙ,
+detail,Noun,[Signal],Ø§ÙØªÙاصÙÙ,
+detection,Noun,,,
+deter,,,,
+device,Noun,[Signal] [Orbot],Ø¬ÙØ§Ø²,
+dialog,Noun,,ÙØ§Ùذة,
+diceware,Noun,,,
+digital,Adjective,,رÙÙ
Ù,
+digital,Noun,,,
+digital certificate,Noun,"A way to confirm automatically that a public key is
correct (is really the one that's used by a particular entity), in order to
prevent man-in-the-middle attacks. Most often used by web sites to prove to
your browser that you have a secure connection to the real site, and not to
some other system that's tampering with your connection.
+Synonyms: Security certificate.
+Source EFF.",,
+digital signature,Noun,"The use of a mathematical technique to confirm the
origin of information, and to confirm that it wasn't changed since it was
written. Digital signatures may be used with software downloads to make sure
that the software you're installing is the same as the official published
version, and that nobody has tampered with it. They're also often used on
encrypted email and for many other purposes. When information isn't protected
by a digital signature, an Internet service provider or other communications
provider could change the contents of what someone wrote or published, and
there wouldn't be a technical means to detect that this happened.
+Synonyms: cryptographic signature.
+Source EFF.",,
+diplomats,,,,
+directory,Noun,[Signal],دÙÙÙ/Ù
Ø¬ÙØ¯,
+directory authorities,Noun,,,
+disable,Verb,[Signal] [Orbot],تعطÙÙ,
+disabled,,,,
+disabled,Adjective,,Ù
ÙØ¹Ø·Ù,
+disabled,Verb,,Ù
ÙØªØ¹Ø·Ù,
+disappearing message,Noun,[Signal],,
+discard,Verb,[Signal],تجاÙÙ,
+disclaimer,Noun,,,
+disconnect,Verb,[Signal],,
+discouraged,,,,
+discussion,Noun,,ÙÙØ§Ø´,
+disk,Noun,"In most contexts in Martus, ""disk"" refers to any sort of
removable storage device (USB, CD, floppy disk etc.)",ÙØ±Øµ,
+diversify,,,,
+document,Noun,[Signal],,
+domain,Noun,An area or set of activities in one's digital life that has
certain security requirements and therefore involves the use of certain qube.,,
+domain name,Noun,"The address, in words, of a website or Internet service; for
example: ssd.eff.org. (Source: EFF)",اسÙ
ÙØ·Ø§Ù,Ø§ÙØ¹ÙÙØ§ÙØ Ù
ÙØªÙبا٠باستخداÙ
Ø£ØØ±ÙØ ÙÙ
ÙÙØ¹ Ù
ا أ٠خدÙ
Ø©
Ø¥ÙØªØ±Ùت Ù
عÙÙØ©. Ù
Ø«ÙØ§Ù: ssd.eff.org
+domestic violence survivors,,,,
+domestic violence survivors,Noun,,,
+donating,,,,
+donating,Verb,,,
+donation,,,,
+donation,Noun,,,
+donation process,Noun,,,
+donations,,,,
+donations,Noun,"feminine noun, otherwise a (V) verb.
+eu doo
+tu doas
+ele doa
+nós doamos
+vós doais
+eles doam",,
+donations options,,,,
+donor,Noun,,,
+download,,,,
+download,Noun,[Globaleaks],Ø§ÙØªÙزÙÙ,
+download,Verb,[Globaleaks],ØªÙØ²ÙÙØ تØÙ
ÙÙ,
+draft,Noun,,,
+drag,Verb,,Ø³ØØ¨,
+drop-down list,Noun,,,
+dual boot,Noun,,,
+ePub Reader,Noun,,,
+eQualitie,Noun,Do not translate,,
+eavesdropper,Noun,,,
+eavesdroppers,,,,
+edit,Verb,,تعدÙÙ,
+eepsite,Noun,,,
+eligibility criteria,Noun,,,
+email,,,,
+email,Noun,,,
+email address,,,,
+email address,Noun,,عÙÙØ§Ù Ø§ÙØ¨Ø±Ùد Ø§ÙØ¥ÙÙØªØ±ÙÙÙ,
+email identity (e-mail identity),Noun,Synonym: e-mail identity,,
+email provider,Noun,,Ù
Ø²ÙØ¯ Ø§ÙØ¨Ø±Ùد Ø§ÙØ§ÙÙÙØªØ±ÙÙÙ,
+"email, e-mail",Noun,Synonym: e-mail,Ø§ÙØ¨Ø±Ùد Ø§ÙØ¥ÙÙØªØ±ÙÙÙ,
+emailing,,,,
+embedded,Adjective,,Ù
ÙØ¯Ù
ÙØ¬,
+emoji,Noun,[Signal],,
+enable,Verb,[Signal] [Globaleaks] [Orbot],ØªÙØ¹ÙÙ,
+enabling,,,,
+encoded,Adjective,,Ù
رÙ
ÙØ²,
+encrypt,Verb,[Orbot] Cryptography is the process of encryption and decryption
of data. [Signal],تشÙÙØ±,"""عÙ
ÙÙØ© تأخذ Ø§ÙØ±Ø³Ø§Ø¦Ù
ÙØªØ¬Ø¹ÙÙØ§ ØºÙØ± Ù
ÙØ±Ùءة سÙÙ Ù
Ù ÙØ¨Ù Ø§ÙØ´Ø®Øµ Ø§ÙØ°Ù
ÙØ¹Ø±Ù ÙÙÙÙØ© Ù٠تشÙÙØ±Ùا ÙÙØ¬Ø¹ÙÙØ§ ÙØ§Ø¨ÙØ©
ÙÙÙØ±Ø§Ø¡Ø© Ù
جدداÙ."" (EFF)"
+encrypted,Adjective,[Globaleaks],Ù
ÙØ´Ùر,
+encrypted communication,Noun,,,
+encrypted message,Noun,,,
+encrypted persistent storage,Noun,[Tails],,
+encryption,Noun,"[Globaleaks] [Orbot] A process that takes a message and makes
it unreadable except to a person who knows how to ""decrypt"" it back into a
readable form. (Source: EFF)",Ø§ÙØªØ´ÙÙØ±,"""عÙ
ÙÙØ© تأخذ
Ø§ÙØ±Ø³Ø§Ø¦Ù ÙØªØ¬Ø¹ÙÙØ§ ØºÙØ± Ù
ÙØ±Ùءة سÙÙ Ù
Ù ÙØ¨Ù Ø§ÙØ´Ø®Øµ
Ø§ÙØ°Ù ÙØ¹Ø±Ù ÙÙÙÙØ© Ù٠تشÙÙØ±Ùا ÙÙØ¬Ø¹ÙÙØ§ ÙØ§Ø¨ÙØ©
ÙÙÙØ±Ø§Ø¡Ø© Ù
جدداÙ."" (EFF)"
+encryption key,Noun,"[Globaleaks] An encryption key is a piece of information
that is used to convert a message into an unreadable form. In some cases, you
need the same encryption key to decode the message. In others, the encryption
key and decryption key are different. (Source: EFF)",Ù
ÙØ§ØªÙØ
Ø§ÙØªØ´ÙÙØ±,
+end-to-end,Conjunction,,Ù
٠طر٠إÙ٠طرÙ,
+end-to-end encryption,Noun,"End-to-end encryption ensures that a message is
turned into a secret message by its original sender, and decoded only by its
final recipient. Other forms of encryption may depend on encryption performed
by third-parties. That means that those parties have to be trusted with the
original text. End-to-end encryption is generally regarded as safer, because it
reduces the number of parties who might be able to interfere or break the
encryption. (Source: EFF) [Signal]",Ø§ÙØªØ´ÙÙØ± Ù
٠طر٠إÙÙ
طرÙ,تضÙ
Ù Ø§ÙØ´ÙÙØ±Ø© اÙÙ
ØªØ¨Ø§Ø¯ÙØ© بÙ٠طرÙÙ٠تØÙÙÙ
Ø±Ø³Ø§ÙØ© Ø¥ÙÙ Ø±Ø³Ø§ÙØ© Ø³Ø±ÙØ© Ù
Ù ÙØ¨Ù Ù
رسÙÙØ§ Ø§ÙØ£ØµÙÙØ
ÙÙ٠تشÙÙØ±Ùا ÙÙØ· Ù
Ù ÙØ¨Ù اÙÙ
Ø³ØªÙØ¨Ù اÙÙÙØ§Ø¦Ù اÙÙ
ÙØµÙد. ÙØ¯ تعتÙ
د Ø£Ø´ÙØ§Ù Ø§ÙØªØ´ÙÙØ± Ø§ÙØ£Ø®Ø±Ù عÙÙ
تشÙÙØ± تجرÙÙ Ø£Ø·Ø±Ø§Ù Ø«Ø§ÙØ«Ø©. ÙØ°ÙÙ ÙØ¹Ù٠أ٠تÙÙ
Ø§ÙØ£Ø·Ø±Ø§Ù ÙØ¬Ø¨ أ٠تÙÙÙ Ù
ÙØ«ÙÙØ© ÙØªØ¹Ø§Ù
ÙÙØ§ Ù
ع اÙÙØµ
اÙ
أصÙÙ. ÙØ¹ØªØ¨Ø± Ø§ÙØªØ´ÙÙØ± اÙÙ
تباد٠بÙ٠طرÙÙÙ
عادة Ø£ÙØ«Ø± Ø£Ù
ÙØ§Ù ØÙØ« Ø£ÙÙ ÙÙÙØµ عدد Ø§ÙØ£Ø·Ø±Ø§Ù
اÙÙØ§Ø¯Ø±Ø© عÙÙ Ø§ÙØªØ¯Ø®Ù Ø£Ù ÙÙ Ø§ÙØªØ´ÙÙØ±.
+end-user,Noun,,,
+engine,,,,
+ensure,,,,
+enter,Verb,,إدخÙ,
+entry guard,Noun,,,
+error,Adjective,,,
+error,Noun,[Signal],خطأ,
+event log,Noun,,Ø³Ø¬Ù Ø§ÙØØ§ÙØ§Øª,
+exception,Noun,,,
+exchange,Verb,,تبادÙ,
+excited,,,,
+executable,Noun,,,
+exercised,,,,
+exit,Noun,,Ø®Ø±ÙØ¬,
+exit,Verb,,Ø®Ø±ÙØ¬,
+exit relay,,,,
+exit relay,Noun,,,
+exited,Verb,,خرج,
+experience,Verb,,,
+expiration,Noun,,,
+expiration date,Noun,,ØªØ§Ø±ÙØ® Ø§ÙØªÙاء Ø§ÙØµÙاØÙØ©,
+expire,Verb,[Signal],,
+expired,Noun,,,
+expiry,Noun,[Globaleaks],,
+expiry,Verb,[Signal],,
+export,Noun,[Signal],,
+export,Verb,[Signal],ØªØµØ¯ÙØ±,
+extend,Verb,[Globaleaks],,
+extension,Noun,"A piece of software that modifies another software
application, changing how it works or what it can do. Often add-ons can add
privacy or security features to web browsers or email software. Some add-ons
are malware, so be careful to install only those that are reputable and from
official sources. (Synonyms: Add-on, Plugin)(Source: EFF)",,
+extent,,,,
+external storage,Noun,,,
+extract,Verb,,,
+fail,Verb,[Signal],,
+failed,Adjective,,,
+faq,,,,
+fax,Noun,[Signal] As in âfax machine.â,,
+feature,Noun,[Signal],,
+feature set,Noun,,,
+feed,Noun,E.g. RSS feed,,
+feedback,,,,
+fees,,,,
+fetch,Verb,[Signal],,
+ficheiro,Noun,,,
+field,,,,
+field,Noun,[Globaleaks] A data entry field,Ø®Ø§ÙØ©Ø ØÙÙ,
+figuring out,,,,
+file,Noun,A data entry field [Signal] [Globaleaks],Ù
ÙÙ,
+file ,Noun,,,
+file attachment,,,,
+file attachment,Noun,[Globaleaks],,
+file container,Noun,,,
+file sharing,Noun,,,
+filed,,,,
+filesystem,Noun,,,
+filled out,,,,
+filter,Noun,,,
+financial,,,,
+financially,,,,
+find,Verb,,,
+fingerprint,Noun,"[Orbot] The keys of public key cryptography are very large
numbers, sometimes a thousand or more digits long. A fingerprint is a much
smaller number or set of numbers and letters that can be used as a unique name
for that key, without having to list all of the key's digits. So, for instance,
if you and a friend wished to make sure you both had the same key, you could
either spend a long time reading off all the hundreds of digits in the key, or
you could each calculate your key's fingerprint and compare those instead. The
fingerprints presented by cryptographic software usually consist of around 40
letters and numbers. If you carefully check that a fingerprint has the right
value, you should be safe against impersonation using a fake key. Some software
tools may offer more convenient alternative ways to verify a friend's key, but
some form of verification needs to happen to prevent communications providers
from easily being able to listen in.
+Source EFF.",,
+fingerprint identification,Noun,,,
+firewall,Noun,"[Orbot] A tool that protects a computer from unwanted
connections to or from local networks and the Internet. A firewall might have
rules that forbid outgoing email, or connections to certain websites. Firewalls
can be used as a first line of defense to protect a device from unexpected
interference. Or they can be used to prevent users from using the Internet in
certain ways. (Source: EFF)",,
+fits,,,,
+fix,Noun,,,
+fix,Verb,,,
+flight vouchers,,,,
+floodfill,Noun,,,
+floodfill peer,Noun,,,
+folder,Noun,[Signal],,
+follow,Verb,,,
+for,Preposition,,,
+form,,,,
+forum,Noun,[Signal],,
+forward,,,,
+forward,Verb,"[Signal] As in, âto forward an email or a message.â",,
+foundations,,,,
+fragment,Noun,,,
+fraudulent ,,,,
+free,,,,
+free,Adjective,,,
+freedom,Noun,[Orbot],,
+freedoms,,,,
+frontdesk,,,,
+full restricted route,Noun,,,
+fund us,,,,
+funding,,,,
+furthering,,,,
+gateway,Noun,,,
+gender,Noun,,,
+general,Adjective,,,
+generate,Verb,"As in ""generate key"" [Signal]",تÙÙÙØ¯,
+generation,Noun,,,
+generation ,Noun,,,
+generator,Noun,,,
+generator ,Noun,,Ù
ÙÙØ¯,
+geo-location,Noun,,Ù
ÙÙØ¹ جغراÙÙ,
+geography-based blocking,,,,
+gift,,,,
+gift cards,,,,
+gift matching,,,,
+gist,Noun,"""In computing, Gist is a scientific graphics library written in C
by David H. Munro of Lawrence Livermore National Laboratory. It supports three
graphics output devices: X Window, PostScript, and Computer Graphics Metafiles
(CGM). The library is promoted as being small (writing directly to Xlib),
efficient, and full-featured. ""
-https://en.wikipedia.org/wiki/Gist_(computing) [Signal]",,
+giving,,,,
+goal,Noun,,,
+grants,,,,
+guard,Noun,,,
+guard relay,Noun,[The Tor Project],,
+guidelines,Noun,,,
+handshake,Noun,Signal exchange process between pieces of equipment until they
are synchronized. Transmitting and receiving communication can then take
place.,,
+hardware,,,,
+header,Noun,,,
+help,Noun,,,
+help,Verb,,,
+helper link,Noun,,,
+helper link ,Noun,,,
+hidden service,Noun,[Tor],,
+hidden services,,,,
+hidden services,Noun,[Tor],,
+hidden volume,Noun,[VeraCrypt],,
+hide,Verb,,,
+high bandwidth,Noun,,,
+high capacity,Noun,,,
+high latency,Noun,,,
+high-quality,,,,
+hint,Noun,,,
+history,Noun,"As in ""Browser History""",,
+home,Noun,[Globaleaks],,
+home directory,Noun,,,
+hoodie,,,,
+hoodie,Noun,,,
+hoodies,,,,
+host,Noun,[Signal] [Globaleaks] [Orbot],,
+host,Verb,[Orbot],,
+hostname,Noun,,,
+hostnames,Noun,,,
+hour,Noun,,,
+however,,,,
+https://tb-manual.torproject.org/en-US/bridges.html,,,,
+human rights,,,,
+human rights,Noun,,ØÙÙÙ Ø§ÙØ¥ÙساÙ,
+human rights abuses,,,,
+i.e.,Noun,,,
+iCloud,Noun,[Signal],,
+iOS,Noun,,,
+iPhone,Noun,,,
+ice breakers,Noun,,,
+icon,Noun,[Signal] [Orbot],,
+identicon,Noun,"A computer generated visual icon used as an alternative
digital fingerprint. aka ""identicon"".
+Synonym: avatar",,
+identity,Noun,[Orbot],,
+ignore,Verb,,,
+illegal,,,,
+illustrated,Adverb,,,
+illustrated ,Adverb,,,
+image,Noun,,,
+implement,,,,
+import,Noun,[Signal],,
+import,Verb,[Signal],Ø§Ø³ØªÙØ±Ø¯,
+improve,Verb,,,
+in touch,,,,
+in-transit encryption,Noun,,,
+inactivity timeout,Noun,,,
+inbox,Noun,,,
+include,Verb,,,
+incognito,Noun,[Signal],,
+income,,,,
+incoming,Adjective,[Signal],,
+incompatible,Adjective,,,
+incremental,Adjective,,,
+individuals,,,,
+info,Noun,,,
+information,Noun,,,
+informator,Noun,[Globaleaks],,
+input,Noun,,,
+input,Verb,[Globaleaks],,
+inquiries,,,,
+install,Verb,[Orbot],,
+installation,Noun,,,
+installer,Noun,,,
+institutions,,,,
+intended,,,,
+intercept,Verb,[Signal],,
+interface,Noun,,,
+internet,Noun,[Signal] [Orbot],,
+internet ,,,,
+"internet filtering, content filtering",Noun,[Orbot] Filtering is the politer
term for blocking or censoring Internet traffic. (Synonyms: blocking) (Source:
EFF),,
+interrupt,Verb,,,
+intranet,Noun,,,
+invalid,Adjective,[Orbot],ØºÙØ± ØµØ§ÙØ,
+involved,,,,
+iptables,Noun,"[Orbot] ""iptables is a user-space utility program that allows
a system administrator to configure the tables[2] provided by the Linux kernel
firewall (implemented as different Netfilter modules) and the chains and rules
it stores. Different kernel modules and programs are currently used for
different protocols; iptables applies to IPv4, ip6tables to IPv6, arptables to
ARP, and ebtables to Ethernet frames."" (Wikipedia)",,
+isim,,,,
+isolate,Verb,,,
+isolation,Noun,,,
+issue,Noun,[Signal],,
+jar,Noun,"âA JAR (Java ARchive) is a package file format typically used to
aggregate many Java class files and associated metadata and resources (text,
images, etc.) into one file for distribution.â
(https://en.wikipedia.org/wiki/JAR_(file_format))",,
+jump service link,Noun,,,
+kernel,Noun,,,
+key,Noun,"In cryptography, a piece of data which gives you the capability to
encrypt or decrypt a message. (Source EFF) [Globaleaks] [Signal]",,
+key ID,Noun,,,
+key code,Noun,[Globaleaks],,
+key list,Noun,,ÙØ§Ø¦ØØ© اÙÙ
ÙØ§ØªÙØ,
+key owner,Noun,,ØµØ§ØØ¨ اÙÙ
ÙØªØ§Ø,
+key pair,Noun,"To receive encrypted messages using public key cryptography
(and to reliably inform others that a message genuinely came from you), you
need to create two keys. One, the private key, you keep secret. The other, the
public key, you can let anyone see. The two keys are connected mathematically,
and are often collectively known as a ""key pair.""
+Source EFF.
+Synonym: keypair",Ù
ÙØªØ§ØØ§Ù,
+key password,Noun,,,
+key size,Noun,,Ø·Ù٠اÙÙ
ÙØªØ§Ø,
+keyboard,Noun,[Signal],,
+keychain,Noun,,,
+keypair (key pair),Noun,,,
+keyring,Noun,"If you use public key cryptography, you'll need to keep track of
many keys: your secret, private key, your public key, and the public keys of
everyone you communicate with. The collection of these keys is often referred
to as your keyring.
+Source EFF.",Ù
Ø³ØªÙØ¯Ø¹ اÙÙ
ÙØ§ØªÙØ,
+keyserver,Noun,,,
+keyword,Noun,,ÙÙÙ
ات Ù
ÙØªØ§ØÙØ©,Not sure
+kidnapping,Noun,,,
+kind,,,,
+kinds,,,,
+label,Noun,[Globaleaks],تسÙ
ÙØ©,
+language,Noun,[Globaleaks],,
+large,,,,
+launch,Noun,,,
+launch,Verb,[Signal],,
+law enforcement,Noun,"Sometimes used for ""law enforcement agencies"".",,
+law enforcement agency,Noun,,,
+learn,,,,
+legal,,,,
+legal costs,,,,
+legitimate,Adjective,,,
+library,Noun,"Refers to a ""library"" in computing",,
+license,Noun,,,
+license ,Noun,,,
+licensing,Noun,,,
+limited edition,,,,
+line-of-sight,Noun,,,
+link,Noun,,ÙØµÙØ©,
+link,Verb,[Signal],,
+linked device,Noun,[Signal] A mobile phone with a Signal account that is
connected to a Signal Desktop account.,,
+little,,,,
+live,Adverb,,,
+load,Noun,[Globaleaks],,
+load,Verb,[Globaleaks] [Signal],,
+loading,Verb,[Globaleaks],,
+locale,Noun,"A collection of rules and data specific to a language and a
geographic area. Locales include information on sorting rules, date and time
formatting, numeric and monetary conventions, and character classification.",,
+locate,Noun,,,
+located,,,,
+location,Noun,,,
+lock,Verb,,,
+lock icon,Noun,,Ø£ÙÙÙÙØ© اÙÙÙÙ,
+log,Noun,[Signal] [Orbot],,
+log,Verb,[Globaleaks],,
+log data,Noun,,,
+log file,Noun,,,
+log in,Verb,,,
+logged in,Adjective,[Globaleaks],,
+logging,,,,
+logging,Noun,,,
+login,Noun,[Globaleaks],ÙÙÙØ¬,
+logo,Noun,,Ø¹ÙØ§Ù
Ø©,
+logout,Noun,[Globaleaks],Ø®Ø±ÙØ¬,
+long,Adjective,[Globaleaks],,
+low latency,Noun,,,
+macOS,Noun,[Signal],,
+machine learning,Noun,,,
+mail,,"In Português when you say ""Mail"" we understand it as ""snail mail""
that in Português means, ""correio""",,
+mail,Noun,,,
+mailbox,Noun,,,
+mailing,,,,
+mailing address,,,,
+mailing list,Noun,,,
+main menu,Noun,,اÙÙØ§Ø¦Ù
Ø© Ø§ÙØ±Ø¦ÙØ³ÙØ©,
+maintain,Verb,,,
+manifest,Noun,,,
+manual,Adjective,,,
+master key,Noun,,Ù
ÙØªØ§Ø Ø±Ø¦ÙØ³Ù,
+match,Verb,,,
+match ,Verb,,,
+matching,,,,
+"mbps, MB/s",Noun,[Orbot] megabytes per second,,
+mechanism,,,,
+media,Noun,[Signal],,
+media message,Noun,[Signal],,
+meek-azure,Adjective,,,
+member,,,,
+membership program,,,,
+menu,Noun,,ÙØ§Ø¦Ù
Ø©,
+menu bar,Noun,[Signal],,
+message,Noun,[Signal],Ø±Ø³Ø§ÙØ©,
+message body,Noun,,,
+message thread,Noun,"Alternative to ""conversation""",,
+messaging,Noun,[Orbot],,
+meta search engine,,,,
+metadata,Noun,"Metadata (or ""data about data"") is everything about a piece
of information, apart from the information itself. So the content of a message
is not metadata, but who sent it, when, where from, and to whom, are all
examples of metadata. Legal systems often protect content more than metadata:
for instance, in the United States, law enforcement needs a warrant to listen
to a person's telephone calls, but claims the right to obtain the list of who
you have called far more easily. However, metadata can often reveal a great
deal, and will often need to be protected as carefully as the data it
describes. (Source EFF) [Signal]",Ø¨ÙØ§Ùات ÙØµÙÙØ©,"""Ø§ÙØ¨ÙØ§ÙØ§Øª
اÙÙØµÙÙØ© (Ø£Ù ""Ø§ÙØ¨ÙØ§ÙØ§Øª ØÙÙ Ø§ÙØ¨ÙØ§ÙØ§Øª"") ÙÙ ÙÙ
Ø´ÙØ¡ ØÙÙ ÙØ·Ø¹Ø© Ù
٠اÙÙ
عÙÙÙ
ات ÙÙØ§ تتضÙ
٠اÙÙ
عÙÙÙ
Ø© ÙÙØ³Ùا. ÙØ°Ø§ Ù
ØØªÙÙ Ø§ÙØ±Ø³Ø§ÙØ© ÙÙØ³ Ø¨ÙØ§Ùات
ÙØµÙÙØ©Ø ÙÙÙÙ Ù
٠أرسÙÙØ§ ÙÙ
ت٠ÙÙ
٠أÙÙ ÙÙÙ
Ù
ÙÙÙØ§ Ø£Ù
Ø
«ÙØ© عÙÙ Ø¨ÙØ§Ùات ÙØµÙÙØ©. ØºØ§ÙØ¨Ø§Ù Ù
ا تØÙ
٠اÙÙØ¸Ù
Ø§ÙØªØ´Ø±ÙØ¹ÙØ© اÙÙ
ØØªÙÙ Ø£ÙØ«Ø± Ù
Ù Ø§ÙØ¨ÙØ§ÙØ§Øª
اÙÙØµÙÙØ©: عÙ٠سبÙ٠اÙÙ
Ø«Ø§ÙØ Ù٠اÙÙÙØ§Ùات اÙÙ
ØªØØ¯Ø© ØªØØªØ§Ø¬ ÙÙØ§Øª تطبÙ٠اÙÙØ§ÙÙÙ ÙÙ
Ø°ÙØ±Ø©
ÙÙØªÙصت عÙÙ Ù
ÙØ§ÙÙ
ات شخص Ù
Ø§Ø ÙÙÙÙ ÙÙØ§ Ø§ÙØÙ ÙÙ
Ø§ÙØØµÙ٠عÙÙ ÙØ§Ø¦Ù
Ø© Ø¨Ø§ÙØ£Ø´Ø®Ø§Øµ Ø§ÙØ°ÙÙ Ø§ØªØµÙØª بÙÙ
بشÙÙ Ø£ÙØ«Ø± سÙÙÙØ©. ÙÙÙÙ Ø§ÙØ¨ÙØ§ÙØ§Øª اÙÙØµÙÙØ©
ØºØ§ÙØ¨Ø§Ù Ù
ا ØªÙØ´Ù اÙÙØ«ÙØ±Ø ÙØ³ØªØØªØ§Ø¬ ÙØÙ
Ø§ÙØªÙا
بÙÙØ³ Ø§ÙØØ±Øµ Ø§ÙØ°Ù تØÙ
Ù Ø¨Ù Ø§ÙØ¨ÙØ§ÙØ§Øª Ø§ÙØªÙ
تصÙÙØ§."" (EFF)"
+method,,,,
+microphone,Noun,[Signal],,
+middle relay,Noun,,,
+migrate,Verb,[Signal],,
+miniLock,Noun,,,
+minimize,Verb,Minimize a window,,
+ministreaming library,Noun,[I2P],,
+minute,Noun,,,
+mirror,Noun,,,
+miscellaneous,Adjective,,,
+missing,,,,
+mixed content,Noun,,,
+mobile,Adjective,,Ù
ØÙ
ÙÙ,
+mobile data,Noun,,,
+mobile devices,,,,
+mobile notifications,Noun,,,
+mobile number,Noun,,,
+modal,Adjective,,Ù
Ø´Ø±ÙØ·,
+mode,Noun,[Globaleaks] [Orbot],,
+modes,,,,
+module,Noun,,,
+money order,,,,
+monitor,,,,
+month,Noun,,,
+mount,Verb,,,
+mouse,Noun,,,
+move,Verb,,,
+multi-boot,Noun,,,
+multimedia,Adjective,[Signal],,
+mute,Noun,[Signal],,
+mute,Verb,,,
+name,,,,
+name,Noun,,,
+nameserver,Noun,,,
+nearly,,,,
+neighborhood,Noun,,,
+network,,,,
+network,Noun,[Signal] [Orbot],,
+network admin,Noun,,,
+network administrator,Noun,,,
+network request,Noun,,,
+networking,Noun,,,
+new,Adjective,,,
+nickname,Noun,,,
+"nickname, nick",Noun,[Orbot],,
+node,Noun,[Orbot],,
+non-financial,,,,
+non-private,,,,
+non-profit organization,,,,
+nonprofits,,,,
+note,Noun,,,
+notification,Noun,[Globaleaks] [Signal],,
+notify,Verb,,,
+obfs3,Adjective,,,
+obfs4,Adjective,,,
+obfuscate,Verb,"[Orbot] Transforming of a section of code or program to make
it totally unintelligible to a human reader, even if helped by software
tools.",,
+obfuscation,Noun,"Transformation of a section of code or program to make it
totally unintelligible to a human reader, even if helped by software tools.",,
+obfuscation layer,Noun,"Related to data transmission
+[Tor]",,
+offline,Adjective,[Signal],,
+onboarding,Noun,,,
+once,,,,
+once,Adverb,,,
+onion service,Noun,[Tor],,
+online,,,,
+online,Adjective,[Signal],,
+open,Adjective,,,
+open,Verb,,,
+open source,Noun,[Orbot],,
+open-source,Adjective,[Orbot],,
+opened,Verb,,,
+operate,,,,
+operate,Verb,,,
+operator,Noun,,,
+opt,,,,
+optical,Adjective,,,
+optimization,Noun,[Orbot],,
+optimize,Verb,[Signal] [Orbot],,
+option,Noun,,,
+optional,Adjective,,,
+options,,,,
+or via,,,,
+order,Verb,[Globaleaks],,
+organizations,,,,
+organize,Verb,,,
+other,Adjective,,,
+outer volume,Noun,,,
+outgoing,Adjective,[Signal],,
+output,Noun,,,
+overlay,Noun,,ØªØ£Ø·ÙØ±,
+overview,,,,
+overview page,,,,
+owner,Noun,,,
+ownership,Noun,,,
+pack,,,,
+package,Noun,,,
+package manager,Noun,,,
+padding,Noun,[Orbot],,
+pager,Noun,[Signal],,
+paid,,,,
+pair,Verb,"To link devices, using bluetooth for example. [Signal]",,
+paper,Noun,,,
+paperwork,,,,
+paravirtualization,Noun,"""Paravirtualization"" An efficient and lightweight
virtualization technique originally introduced by the Xen Project and later
adopted by other virtualization platforms.",,
+parent,Adjective,,,
+parse,Verb,,,
+part,Noun,,,
+partial,Adjective,,,
+partially,Adverb,,,
+partition,Noun,"""Disk partitioning or disk slicing[1] is the creation of one
or more regions on a hard disk or other secondary storage, so that an operating
system can manage information in each region separately.""
-https://en.wikipedia.org/wiki/Disk_partitioning",,
+passcode,Noun,A user-chosen and device-specific password. [Signal],,
+passphrase,Noun,A computer-generated set of 6-10 random words used as the
primary authentication for Peerio accounts. [Signal],,
+password,Noun,"A secret meant to be memorized, and meant to limit access to
something so that only someone who knows the password can gain access. It might
limit access to an online account, a device, or something else. A long password
based on multiple words may also be called a ""passphrase"" to remind us that
it's not just one ""word."" A main password to unlock other passwords in a
password manager or password safe application is often called a ""master
password.â
+Source EFF.",ÙÙÙ
Ø© Ø§ÙØ³Ø±,
+passwords,Noun,,,
+paste,Noun,,,
+paste,Verb,,,
+path,Noun,,,
+payload,Noun,,,
+payment,,,,
+peer,Noun,,,
+peer reviewed,Adjective,,,
+peer-to-peer,,,,
+peers,Noun,,,
+pending,Adjective,[Signal],,
+penetration test,Noun,,ÙØØµ Ø§ÙØ§Ø®ØªØ±Ø§Ù,
+perceived performance,Noun,,,
+performance,Noun,,,
+permission,Noun,[Signal] [Orbot],,
+persistence,Adjective,,,
+persistence,Noun,,,
+persistence partition,Noun,,,
+persistent,Adjective,,,
+persistent overlay,Noun,,,
+persistent storage,Noun,[Tails],,
+persistent volume,Noun,,,
+phishing,Noun,,,
+physical surveillance,Noun,,,
+pin,Verb,"Pin a tab, a site in a browser.",,
+ping,Noun,[Globaleaks],,
+please,Adverb,,,
+please mail,,,,
+pluggable transports,Noun,,,
+plugin,Noun,"A piece of software that modifies another software application,
changing how it works or what it can do. Often add-ons can add privacy or
security features to web browsers or email software. Some add-ons are malware,
so be careful to install only those that are reputable and from official
sources. (Synonyms: add-on, extension)(Source: EFF)",,
+policies,Noun,,,
+policies,Verb,,,
+policy,Noun,,,
+policymakers,,,,
+popup,Noun,,ÙØ§Ùذة Ù
ÙØ¨Ø«ÙØ©,
+popup window,Noun,,,
+port,Noun,[Signal] [Globaleaks] [Orbot],,
+portable,Adjective,,,
+postponed,Adjective,[Globaleaks],,
+predecessor attack,Noun,,,
+preenchido,,,,
+preference,Noun,[Globaleaks],,
+preferences,Noun,[Globaleaks] [Signal],ØªÙØ¶ÙÙØ§Øª,
+preferences page,Noun,[Globaleaks],,
+preferred,,,,
+prevent,,,,
+prevent,Verb,,Ø§ØªÙØ§Ø¡,
+prevents,,,,
+preview,Noun,[Globaleaks],,
+preview,Verb,[Signal],,
+privacy,,,,
+privacy,Noun,[Signal] [Orbot],,
+privacy advocates,,,,
+privacy notice,Noun,,,
+privacy officer,Noun,,,
+privacy-enhancing,,,,
+private,,,,
+private,Adjective,,,
+private browsing,,,,
+private key (secret key),Noun,,Ù
ÙØªØ§Ø سرÙ,
+privoxy,Noun,,,
+probing,Verb,,,
+process,,,,
+process,Noun,,عÙ
ÙÙØ©,
+process,Verb,[Signal],,
+processed,Adjective,,,
+processor,,,,
+profile,Noun,[Signal],تشÙÙÙØ©,
+program,Noun,,,
+proof,Noun,,,
+proofs,Noun,,,
+properly,Adverb,,,
+protects,,,,
+protocol,Noun,"[Orbot] A communications protocol is a way of sending data
between programs or computers. Software programs that use the same protocol can
talk to each other: so web browsers and web servers speak the same protocol,
called ""http"". Some protocols use encryption to protect their contents. The
secure version of the http protocol is called ""https"". Another example of an
encrypted protocol used by many different programs is OTR (Off-the-Record), a
protocol for secure messaging. (Source EFF)",,
+prototype,Noun,,ÙÙ
ÙØ°Ø¬,
+provide,,,,
+provider,Noun,,,
+providers,,,,
+proxied,Adjective,,,
+proxied site,Noun,,,
+proxy,Noun,[Orbot],,
+proxy,Verb,[Orbot],,
+proxy test,Noun,,,
+proxychains,,,,
+public account ID,Noun,The Martus account's public identifier,Ù
عرÙ
Ø§ÙØØ³Ø§Ø¨ Ø§ÙØ¹Ù
ÙÙ
Ù,
+public code,Noun,,Ø§ÙØ±Ù
ز Ø§ÙØ¹Ù
ÙÙ
Ù,
+public key,Noun,,Ù
ÙØªØ§Ø عÙÙÙ,
+public key / public account key,Noun,[Martus] The Martus account's public
key,Ù
ÙØªØ§Ø عÙ
ÙÙ
Ù,
+public key infrastructure,Noun,,بÙÙØ© ØªØØªÙØ© Ø±Ø¦ÙØ³Ø© عاÙ
Ø©,
+publicly,,,,
+publish,,,,
+publish,Verb,,,
+pull,Noun,9,,
+pull,Verb,"In the context of commits (GitHub, GitLab etc.)",,
+punching,Noun,"Networking technique.
+https://en.wikipedia.org/wiki/Hole_punching_(networking)",,
+purpose,,,,
+push framework,Noun,[Signal],,
+push notification,Noun,[Signal],,
+quality-wise,,,,
+qube,Noun,[QubesOS] A user-friendly term for a VM in Qubes OS.,,
+question,Verb,,,
+questionaire,Noun,,,
+queue,Verb,"To form or wait in a line. ""Queued"" messages may be waiting to
be sent for example. [Signal]",,
+quit,Verb,[Signal],,
+range,,,,
+range,Noun,[Globaleaks],,
+read receipt,Noun,[Signal],,
+read-only,Adjective,,,
+reader,Noun,,,
+receipt,,,,
+receipt,Noun,[Globaleaks],,
+receive,Verb,,,
+receiver,Noun,,,
+recipient,Noun,[Globaleaks] [Signal],Ù
ÙØ³ØªÙÙÙ
,
+recommend,,,,
+recommend,Verb,,,
+reconnect,Verb,,,
+record,Noun,,تسجÙÙØ©Ø تسجÙÙ,
+record,Verb,,,
+records,,,,
+recover,Verb,"Recover data, an account, etc.",استرداد,
+recover an amount,Verb,"Recover money that you have spent, invested, or lent,
you get the amount back.",,
+redact,,,,
+redacted,Verb,,,
+reenter,Verb,,,
+referral code,Noun,,,
+refund,,,,
+refunded,,,,
+register,Verb,,,
+regular,Adjective,,,
+regular expression,Noun,,,
+reinstall,Verb,[Signal],,
+reject,,,,
+reject,Verb,,,
+relay,,,,
+relay,Noun,[Orbot],,
+relay,Verb,[Signal],,
+relay directory,Noun,,,
+relay node,Noun,[Orbot],,
+relays,,,,
+relays,Noun,,,
+release,Noun,,,
+release,Verb,,,
+release candidate,Noun,,إصدار Ù
رشÙÙØ,
+release notes,Noun,[Signal],,
+relink,Verb,[Signal],,
+reload,,,,
+reload,Verb,[Globaleaks],Ø¥ÙØ¹Ø§Ø´,"Ø£Ù ""إعادة Ø§ÙØªØÙ
ÙÙ"" ÙÙ
ØØ§Ù اÙÙ
Ø·Ø§ÙØ¨Ø© بÙ
عÙÙÙ
ات Ù
ØØ¯ÙÙØ«Ø©"
+rely,,,,
+remaining,Adjective,,,
+remains,,,,
+remove,Verb,,,
+rename,Verb,,,
+render,Verb,,,
+rendering,Adjective,,,
+rendering,Noun,,,
+rent,,,,
+report,,,,
+report,Noun,[Globaleaks],,
+report,Verb,[Signal],,
+reporting,,,,
+repository,Noun,,,
+request,,,,
+request,Noun,[Globaleaks],Ø·ÙØ¨,
+request,Verb,,,
+required,,,,
+required fields,,,,
+requires,,,,
+rescan,Verb,,,
+research,,,,
+researchers,,,,
+resend,Verb,,,
+reserve,,,,
+reset,Noun,,,
+reset,Verb,[Globaleaks] [Signal] [Orbot],,
+resolver,Noun,,,
+resources,,,,
+restart,Noun,,,
+restart,Verb,[Globaleaks] [Signal] [Orbot],,
+restore,Verb,[Signal] [Orbot],استعادة,
+restrict,,,,
+restricted route,Noun,,,
+restriction,Noun,,,
+retained,Verb,,,
+retrieve,Verb,(from server),Ø¬ÙØ¨,
+review,Verb,,,
+revision,Noun,,,
+revokation certificate,Noun,,,
+revoke,Verb,,,
+revoke ,Verb,,,
+revoked,Adjective,,,
+ring,Verb,[Signal],,
+rip,Verb,,,
+robust,,,,
+role,Noun,[Globaleaks],,
+rooftop,Noun,,,
+room,Noun,,,
+root,Adjective,,,
+root,Verb,,,
+root domain,Noun,,اÙÙØ·Ø§Ù Ø§ÙØ±Ø¦ÙسÙ; اÙÙØ·Ø§Ù Ø§ÙØ¬Ø°Ø±,
+"root, root directory",Noun,[Orbot],,
+route,Noun,,,
+route,Verb,[Orbot],,
+router,Noun,,,
+router console,Noun,,,
+router console ,Noun,,,
+routing,Noun,,,
+row,Noun,,,
+rule,Noun,,,
+ruleset,Noun,,,
+run,,,,
+run,Verb,,,
+running,,,,
+safe,,,,
+safely,,,,
+safely,Adverb,,,
+safety number,Noun,[Signal],,
+sandbox,Noun,,Ø¢ÙÙØ© ØªØØ¯Ùد اÙÙØµÙÙ,
+sanitize,Verb,,,
+save,Verb,[Globaleaks],,
+scale,Verb,[Signal],,
+scan,Verb,[Orbot],,
+scope,Noun,[Globaleaks],,
+score,Noun,,,
+scour,Verb,,,
+scramble,Verb,,,
+scroll,Verb,[Signal],,
+scroll bar,Noun,,,
+search,,,,
+search,Verb,[Signal],,
+search engine,Noun,[Orbot],,
+search index,Noun,,,
+search provider,Noun,,,
+second,Noun,,,
+secure,,,,
+secure,Adjective,[Signal] [Orbot],,
+secure,Verb,[Signal],تأÙ
ÙÙ,
+secureApp,Noun,Name of the application.,,
+securely,Adverb,,,
+security,,,,
+security,Noun,[Orbot],,
+security background,Noun,,Ø®ÙÙÙØ© Ø§ÙØ£Ù
اÙ,
+security level,Noun,,,
+security log,Noun,,Ø³Ø¬Ù Ø§ÙØ£Ù
اÙ,
+security token,Noun,,,
+security vulnerability,Noun,,,
+seed,Verb,,,
+select,Verb,,,
+selected,Adjective,,,
+selection,Noun,,,
+selector,Noun,[Globaleaks] [Signal],Ù
ÙÙØªÙÙ,
+sell,,,,
+sell,Verb,,,
+send,Verb,,,
+sender,Noun,[Signal],,
+separate,Adjective,,Ù
ÙÙØµÙ,
+separate,Verb,,,
+server,Noun,[Globaleaks] [Signal] [Orbot],Ø´Ø¨ÙØ©Ø خادÙ
,
+service,Noun,,,
+service provider,Noun,,,
+session,Noun,[Signal],,
+set,Noun,,,
+set,Verb,,,
+set up,,,,
+set up,Verb,,إعداد,
+setting,Verb,"P.Ex. ""Error setting new password""",,
+setup,Noun,,إعداد,
+share,,,,
+share,Noun,,,
+share,Verb,,,
+shortly,,,,
+shovel coal,,,,
+shovel coal (slang word),,,,
+show,Verb,,,
+shown,Verb,,,
+shut down,Verb,,,
+shutdown,Noun,,Ø¥Ø·ÙØ§Ø¡,
+shutting down,Verb,[Globaleaks],,
+sidebar,Noun,,Ø´Ø±ÙØ· Ø¬Ø§ÙØ¨Ù,
+sideload,Verb,x,,
+sign,Noun,,,
+sign,Verb,,,
+sign in,Verb,[Globaleaks],,
+sign out,Verb,,,
+sign up,,,,
+signature,Noun,,,
+signed,Adjective,,,
+signing key,Noun,,,
+signup form,Noun,,,
+similar,,,,
+single,,,,
+site,Noun,Website,,
+site operator,Noun,,,
+size,,,,
+size,Noun,,,
+sizing up,,,,
+slider,Noun,[Signal],,
+small,,,,
+smartphone,Noun,,,
+snail mail,,,,
+software,,,,
+software,Noun,[Globaleaks] [Signal],Ø¨Ø±ÙØ§Ù
ج,
+source,,,,
+source,Noun,[Globaleaks],,
+spam,Noun,,,
+specific,,,,
+specified,,,,
+specify,Verb,,,
+spend,,,,
+spends,,,,
+spin,Verb,,,
+split,Verb,,,
+split GPG,Noun,"""Split GPG"" is the name of a feature. For reference:
https://www.qubes-os.org/doc/split-gpg/",,
+split bar,Noun,,,
+split package,Noun,,,
+sponsor,Noun,,,
+sponsor,Verb,,,
+spoof,Verb,,,
+spoofing,Noun,,,
+spooled,Adjective,[Globaleaks] context: spooled emails,,
+spreadsheet,Noun,,جدÙÙ Ù
Ù
تد,
+staff,,,,
+staffing,,,,
+stand up,Verb,,,
+standalone,Adjective,[Signal],,
+standard,Adjective,[Orbot],,
+standard,Noun,,Ù
Ø¹ÙØ§Ø±,
+start,Noun,,,
+start,Verb,[Globaleaks],,
+startup,Noun,,,
+state,Noun,,,
+statements,,,,
+statistics,Noun,,,
+status,,,,
+status,Noun,[Globaleaks],ØØ§ÙØ©,
+stay,Verb,,,
+stay in,Verb,,,
+sticker,Noun,[Signal],,
+stickers,,,,
+stolen,,,,
+stop,Verb,,,
+storage,Noun,[Signal],,
+stream,Noun,,,
+streaming library,Noun,,,
+strip,Verb,,,
+stuff,,,,
+subject,Noun,[Globaleaks],,
+subkey,Noun,,Ù
ÙØªØ§Ø تابع,
+subkeys,Noun,,,
+submission,Noun,[Globaleaks],,
+submit,Verb,[Signal],,
+submitter,Noun,[GlobaLeaks],,
+submitting,,,,
+subscription,Noun,,,
+substatus,Noun,[GlobaLeaks],,
+such as,,,,
+suggested,Adjective,,,
+suggestion,Noun,,,
+suitable,Adjective,,,
+summary,,,,
+summary,Noun,,Ù
ÙØ®Øµ,
+summary_large_image,,,,
+superuser,Noun,Synonym: root,,
+support,Noun,"[Signal] As in ""support page"" or ""customer support.""",,
+support,Verb,,,
+support portal,Noun,,,
+supported,Adjective,,,
+supporting,,,,
+surveillance,,,,
+surveillance,Noun,[Orbot],,
+sustainability,,,,
+sustainability,Noun,,,
+swarm,Noun,,,
+swipe,Verb,"Swipe up, swipe down [Signal]",,
+switch,Noun,,,
+sync,Verb,[Signal],,
+synthesis,Noun,Repaso y conclusión. En plural es SÃntesis también.,,
+sys-firewall,Noun,,,
+system log,Noun,,,
+system's clock,Noun,,,
+t-shirt,,,,
+tab,Noun,,,
+tackle ambitious projects,,,,
+tag,Noun,,ÙØ³Ù
,
+tag,Verb,,,
+tagging attack,Conjunction,http://www.i2p2.de/how_threatmodel.html#tagging,,
+tap,Verb,,اÙÙ
س,
+tap to explore,Verb,,,
+tarball,Noun,,,
+target,Noun,,,
+taskbar,Noun,,Ø´Ø±ÙØ· اÙÙ
ÙØ§Ù
,
+tax-deductibility,,,,
+tax-deductible,,,,
+tax-exempt,,,,
+taxes,,,,
+team,Noun,,,
+template,Noun,[Globaleaks],ÙØ§Ùب,
+template-based VM,Noun,"[QubesOS] ""Template-Based Virtual Machine""Any VM
which depends on a TemplateVM for its root filesystem.",,
+templates,Noun,,,
+terminal,Noun,,,
+terms of service,Noun,,,
+test bed,Noun,,,
+testing,Noun,,,
+tethering,Noun,[Orbot],,
+text,Noun,,,
+text area,Noun,,,
+text format,Noun,,ÙØ³Ù ÙØµÙ,
+thank-you,,,,
+thanks,,,,
+theme,Noun,[Signal],,
+third-party,Adjective,,Ø§ÙØ·Ø±Ù Ø§ÙØ«Ø§ÙØ«,
+third-party service,,,,
+third-party service providers,,,,
+thread,Noun,"A message ""thread"" is also a ""conversation""",,
+threat model,Noun,"A way of narrowly thinking about the sorts of protection
you want for your data. It's impossible to protect against every kind of trick
or attacker, so you should concentrate on which people might want your data,
what they might want from it, and how they might get it. Coming up with a set
of possible attacks you plan to protect against is called threat modeling. Once
you have a threat model, you can conduct a risk analysis. (Synonyms: Threat
modeling) (Source: EFF)",,
+thresholds,Noun,,,
+throttling,Noun,,,
+thumbnail,Noun,[Signal],,
+thumbs up icon,Noun,"As in the emoji called by ""(y)"" or "":thumbsup:""",,
+ticket,Noun,,,
+time out,Verb,,,
+timeout,Noun,[Signal],Ù
ÙÙØ©,
+timer,Noun,"in computer security, a threat is a potential event that could
undermine your efforts to defend your data. Threats can be intentional
(conceived by attackers), or they could be accidental (you might leave your
computer turned on and unguarded). Source EFF.",,
+timestamp,Noun,"[Signal] Metadata (or ""data about data"") is everything about
a piece of information, apart from the information itself. So the content of a
message is not metadata, but who sent it, when, where from, and to whom, are
all examples of metadata. Legal systems often protect content more than
metadata: for instance, in the United States, law enforcement needs a warrant
to listen to a person's telephone calls, but claims the right to obtain the
list of who you have called far more easily. However, metadata can often reveal
a great deal, and will often need to be protected as carefully as the data it
describes. (Source EFF)",,
+timezone,Noun,,,
+timing attack,Noun,,,
+tip,Noun,[Globaleaks] [Signal],ÙØµÙØØ© Ø®Ø§ØµØ©Ø Ø¨ÙØ§Øº,
+title,Noun,[Signal],عÙÙØ§Ù,
+title bar,Noun,,,
+to,Adverb,,,
+to ,Adverb,,,
+toggle,Noun,,,
+toggle,Verb,To switch back and forth between two options (ex: on/off)
[Signal],,
+token,Noun,,شارة,
+tool,Noun,,أداة,
+tool ,,,,
+toolbar,Noun,[Orbot],,
+tools,Noun,,Ø£Ø¯ÙØ§Øª,
+torification,Noun,[Orbot],,
+torify,Verb,[Orbot],,
+tortification,Noun,,,
+track,,,,
+tracker,Noun,,,
+tracking,Noun,,,
+traffic,Noun,[Orbot],Ù
Ø±ÙØ±,
+traffic analysis attack,Conjunction,,,
+traffic analysis attack,Noun,[Orbot],,
+traffic-blocking browser extension,Noun,"When you visit a website, your
browser sends some information to that site's operators -- your IP address,
other information about your computer, and cookies that link you to previous
visits using that browser, for instance. If the website includes images and
content taken from other web servers, that same information is sent to other
websites as part of downloading or viewing the page. Advertising networks,
analytics providers, and other data collectors may gather information from you
in this way.
+You can install additional software that runs alongside your browser and will
limit how much information is leaked to third-parties in this way. The most
well-known examples are programs that block advertisements. EFF offers a tool
called Privacy Badger which is another traffic-blocking extension.
+Source EFF.",Ø¥Ø¶Ø§ÙØ© ÙÙÙ
ØªØµÙØ تÙ
ÙØ¹ اÙÙÙÙ,Ø¹ÙØ¯ Ø²ÙØ§Ø±Ø© Ù
ÙÙØ¹ عÙÙ Ø´Ø¨ÙØ© Ø§ÙØ¥ÙØªØ±ÙØªØ ÙØ±Ø³Ù Ù
ØªØµÙØÙ Ø¨Ø¹Ø¶ اÙÙ
عÙÙÙ
ات ÙÙ
شغÙ٠ذÙ٠اÙÙ
ÙÙØ¹ - عÙÙØ§Ù IP Ø§ÙØ®Ø§Øµ Ø¨ÙØ
ÙØºÙØ±ÙØ§ Ù
٠اÙÙ
عÙÙÙ
ات Ø¹Ù Ø¬ÙØ§Ø² اÙÙÙ
بÙÙØªØ±
Ø§ÙØ®Ø§Øµ Ø¨ÙØ ÙØ§ÙÙÙÙÙØ² (Ø³Ø¬Ù Ø§ÙØªØªØ¨Ø¹) Ø§ÙØªÙ تربطÙ
Ø¨Ø²ÙØ§Ø±Ø§ØªÙ Ø§ÙØ³Ø§Ø¨ÙØ© ÙÙÙ
ÙÙØ¹ Ù
Ù ÙÙØ³ اÙÙ
ØªØµÙØ Ù
Ø«ÙØ§Ù. إذا ÙØ§Ù اÙÙ
ÙÙØ¹ ÙØªØ¶Ù
Ù ØµÙØ±Ø§Ù Ø£Ù Ù
ØØªÙÙ
آخر Ù
Ù Ù
خدÙ
ات أخر٠عÙÙ Ø§ÙØ¥ÙØªØ±ÙØªØ ÙÙ
Ù٠إرساÙ
ÙÙØ³ اÙÙ
عÙÙÙ
ات Ø¥Ù٠اÙÙ
خدÙ
ات Ø§ÙØ£Ø®Ø±Ù Ø£ÙØ¶Ø§Ù
ÙØ¬Ø²Ø¡ Ù
٠عÙ
ÙÙØ© تØÙ
Ù٠أ٠عرض Ø§ÙØµÙØØ©. ÙØ¯ تجÙ
ع
Ø´Ø¨ÙØ§Øª Ø§ÙØ¥Ø¹ÙØ§ÙØ§Øª ÙÙ
Ø²ÙØ¯Ù خدÙ
ات تØÙÙÙ Ø§ÙØ²Ùار
ÙØºÙرÙÙ
Ù
عÙÙÙ
Ø§ØªÙ Ø¨ÙØ°Ù Ø§ÙØ·Ø±ÙÙØ©. ÙÙ
ÙÙÙ ØªØ«Ø¨ÙØª
برÙ
Ø¬ÙØ§Øª إضاÙÙØ© تعÙ
ÙÙ Ø¨Ø§ÙØªÙاز٠Ù
ع Ù
ØªØµÙØÙ ÙØªØ
د Ù
Ù ÙÙ
اÙÙ
عÙÙÙ
ات Ø§ÙØªÙ تتسرب Ø¥Ù٠أطراÙ
Ø«Ø§ÙØ«Ø© Ø¨ÙØ°Ù Ø§ÙØ·Ø±ÙÙØ©. Ø£ØºÙØ¨ Ø§ÙØ£Ù
Ø«ÙØ© اÙÙ
عرÙÙØ©
Ù٠براÙ
ج ØªØØ¬Ø¨ Ø§ÙØ¥Ø¹ÙØ§ÙØ§Øª. تÙÙØ± اÙÙEFF أداة
تدع٠Privacy Badger ÙÙÙ Ø¥Ø¶Ø§ÙØ© ÙÙÙ
ØªØµÙØ تÙ
ÙØ¹ ÙÙ٠تÙÙ
اÙÙ
عÙÙÙ
ات.
+trainer,Noun,,,
+training,Noun,"(awareness raising session - concientización,
sensibilización)",,
+transparent,Adjective,,,
+transport encryption,Noun,"Encrypting data as it travels across the network,
so that others spying on the network cannot read it.
+Synonyms: transport-layer encryption.
+Source EFF.",تشÙÙØ± اÙÙÙÙ,"""تشÙÙØ± Ø§ÙØ¨ÙØ§ÙØ§Øª Ø£Ø«ÙØ§Ø¡
Ø§ÙØªÙاÙÙØ§ عبر Ø§ÙØ´Ø¨ÙØ©Ø Ø¨ØÙØ« ÙØ§ ÙØ³ØªØ·Ùع
ÙØ±Ø§Ø¡ØªÙا Ù
Ù ÙØªØ¬Ø³Ø³ عÙÙ Ø§ÙØ´Ø¨ÙØ©."" (EFF)"
+transport layer encryption,Noun,"Encrypting data as it travels across the
network, so that others spying on the network cannot read it.
+Synonyms: Transport encryption.
+Source EFF.",تشÙÙØ± اÙÙÙÙ,"""تشÙÙØ± Ø§ÙØ¨ÙØ§ÙØ§Øª Ø£Ø«ÙØ§Ø¡
Ø§ÙØªÙاÙÙØ§ عبر Ø§ÙØ´Ø¨ÙØ©Ø Ø¨ØÙØ« ÙØ§ ÙØ³ØªØ·Ùع
ÙØ±Ø§Ø¡ØªÙا Ù
Ù ÙØªØ¬Ø³Ø³ عÙÙ Ø§ÙØ´Ø¨ÙØ©."" (EFF)"
+transport layer security,Noun,"The technology that permits you to maintain a
secure, encrypted connection between your computer and some of the websites and
Internet services that you visit. When you're connected to a website through
this technology, the address of the website will begin with HTTPS rather than
HTTP. Officially, its name was changed to Transport Layer Security (TLS) in
1999, but many people still use the old name, Secure Sockets Layer (SSL).
+Synonyms: Secure Sockets Layer (SSL).
+Source EFF.",,
+trash,Noun,,Ø³ÙØ© اÙÙ
ÙÙ
ÙØ§Øª,
+trashcan icon,Noun,,,
+tray,Noun,,,
+triggered,Adjective,,,
+troubleshooting,Noun,,,
+trust,Noun,,,
+trust,Verb,,,
+trust on first use,Noun,"TOFU,
https://en.wikipedia.org/wiki/Trust_on_first_use",,
+tunnel,Noun,,,
+tunnel,Verb,,,
+tunneling,Adjective,,,
+tunneling,Noun,,,
+turn off,Verb,,Ø¥ÙÙØ§Ù,
+turn on,Verb,,تشغÙÙ,
+tweet,Noun,,,
+tweet,Verb,,,
+two-factor authentication (2FA),Noun,"""Something you know, and something you
have."" Login systems that require only a username and password risk being
broken when someone else can obtain (or guess) those pieces of information.
Services that offer two-factor authentication also require you to provide a
separate confirmation that you are who you say you are. The second factor could
be a one-off secret code, a number generated by a program running on a mobile
device, or a device that you carry and that you can use to confirm who you are.
Companies like banks, and major internet services like Google, Paypal and
Twitter now offer two-factor authentication.
+Synonyms: two-step verification, multi-factor authentication.
+Source EFF.",ØªÙØ«ÙÙ Ø«ÙØ§Ø¦Ù,"""'Ø´ÙØ¡ تعرÙÙØ ÙØ´ÙØ¡ تÙ
ÙÙÙ'. Ø£ÙØ¸Ù
Ø© تسجÙÙ Ø§ÙØ¯Ø®ÙÙ Ø§ÙØªÙ ØªØªØ·ÙØ¨ اسÙ
Ù
ستخدÙ
ÙÙÙÙ
Ø© Ù
Ø±ÙØ± ÙÙØ· Ù
عرضة ÙÙØ§ÙØªØØ§Ù
Ø¹ÙØ¯Ù
ا
ÙØØµÙ (Ø£Ù ÙØ®Ù
Ù) شخص آخر تÙ٠اÙÙ
عÙÙÙ
ات. Ø§ÙØ®Ø¯Ù
ات Ø§ÙØªÙ ØªÙØ¯Ù
Ø§ÙØªÙØ«ÙÙ Ø§ÙØ«ÙØ§Ø¦Ù ØªØªØ·ÙØ¨ Ø£ÙØ¶Ø§Ù
تÙÙÙØ± طرÙÙØ© Ø£Ø®Ø±Ù ÙØªØ£ÙÙØ¯ Ø£Ù Ø§ÙØ´Ø®Øµ Ø§ÙØ°Ù تزعÙ
Ù. Ø§ÙØ¹Ø§Ù
Ù Ø§ÙØ«Ø§ÙÙ ÙØ¯ ÙÙÙ٠رÙ
Ø²Ø§Ù Ø³Ø±ÙØ§Ù ÙÙ
رة
ÙØ§ØØ¯Ø©Ø أ٠رÙÙ
ا ÙÙÙØ¯Ù تطبÙ٠عÙÙ ÙØ§ØªÙÙ Ø§ÙØ°ÙÙØ
Ø£Ù Ø¬ÙØ§Ø²Ø§Ù ÙÙ
ÙÙÙ ØÙ
ÙÙ ÙØ§Ø³ØªØ®Ø¯Ø§Ù
Ù ÙØªØ£ÙÙØ¯
ÙÙÙØªÙ. ØªÙØ¯Ù
Ø§ÙØ´Ø±Ùات Ù
Ø«Ù Ø§ÙØ¨ÙÙÙ ÙØ®Ø¯Ù
ات
Ø§ÙØ¥ÙØªØ±ÙØª اÙÙØ¨Ùرة Ù
ث٠Google ÙPayPal ٠تÙÙØªØ± Ø¥Ù
ÙØ§ÙÙØ© Ø§ÙØªÙØ«ÙÙ Ø§ÙØ«ÙائÙ."" (EFF)"
+two-step verification,Noun,"""Something you know, and something you have.""
Login systems that require only a username and password risk being broken when
someone else can obtain (or guess) those pieces of information. Services that
offer two-factor authentication also require you to provide a separate
confirmation that you are who you say you are. The second factor could be a
one-off secret code, a number generated by a program running on a mobile
device, or a device that you carry and that you can use to confirm who you are.
Companies like banks, and major internet services like Google, Paypal and
Twitter now offer two-factor authentication. (Synonyms: Two-factor
authentication, multi-factor authentication) (Source EFF)",ØªÙØ«ÙÙ
Ø«ÙØ§Ø¦Ù,"""'Ø´ÙØ¡ تعرÙÙØ ÙØ´ÙØ¡ تÙ
ÙÙÙ'. Ø£ÙØ¸Ù
Ø© تسجÙÙ
Ø§ÙØ¯Ø®ÙÙ Ø§ÙØªÙ ØªØªØ·ÙØ¨ اسÙ
Ù
ستخدÙ
ÙÙÙÙ
Ø© Ù
Ø±ÙØ± ÙÙØ·
Ù
عرضة ÙÙØ§ÙØªØØ§Ù
Ø¹ÙØ¯Ù
ا ÙØØµÙ (Ø£Ù ÙØ®Ù
Ù) شخص آخر
تÙ٠اÙÙ
عÙ
ÙÙ
ات. Ø§ÙØ®Ø¯Ù
ات Ø§ÙØªÙ ØªÙØ¯Ù
Ø§ÙØªÙØ«ÙÙ Ø§ÙØ«ÙائÙ
ØªØªØ·ÙØ¨ Ø£ÙØ¶Ø§Ù تÙÙÙØ± طرÙÙØ© Ø£Ø®Ø±Ù ÙØªØ£ÙÙØ¯ Ø£Ù
Ø§ÙØ´Ø®Øµ Ø§ÙØ°Ù تزعÙ
Ù. Ø§ÙØ¹Ø§Ù
Ù Ø§ÙØ«Ø§ÙÙ ÙØ¯ ÙÙÙ٠رÙ
Ø²Ø§Ù Ø³Ø±ÙØ§Ù ÙÙ
رة ÙØ§ØØ¯Ø©Ø أ٠رÙÙ
ا ÙÙÙØ¯Ù تطبÙÙ
عÙÙ ÙØ§ØªÙÙ Ø§ÙØ°ÙÙØ Ø£Ù Ø¬ÙØ§Ø²Ø§Ù ÙÙ
ÙÙÙ ØÙ
ÙÙ
ÙØ§Ø³ØªØ®Ø¯Ø§Ù
Ù ÙØªØ£ÙÙØ¯ ÙÙÙØªÙ. ØªÙØ¯Ù
Ø§ÙØ´Ø±Ùات Ù
Ø«Ù
Ø§ÙØ¨ÙÙÙ ÙØ®Ø¯Ù
ات Ø§ÙØ¥ÙØªØ±ÙØª اÙÙØ¨Ùرة Ù
ث٠Google
ÙPayPal ٠تÙÙØªØ± Ø¥Ù
ÙØ§ÙÙØ© Ø§ÙØªÙØ«ÙÙ Ø§ÙØ«ÙائÙ."" (EFF)"
+type,Noun,,,
+type,Verb,,,
+unable,Adjective,[Globaleaks],,
+unabled,Adjective,,,
+unavailable,Adjective,[Globaleaks],,
+unblock,Verb,[Signal],,
+uncheck,Verb,,,
+unchoke,Verb,,,
+undelete software,Noun,"Most devices let you delete data from them; For
instance, you can drag a file to the Trash icon, or press delete in a photo
album. But deletion does not always mean that the original data is gone.
Undelete programs are applications that can be used by the device's owner, or
others with access to the device, to restore some data. Undelete programs are
useful for those who accidentally delete their own data, and to those whose
data might have been sabotaged, such as a photographer who has been compelled
to remove images from their camera. However, those same programs can be a
threat to anyone who wants to permanently erase confidential data.
+Source EFF.",برÙ
Ø¬ÙØ§Øª Ø¥ÙØºØ§Ø¡ Ø§ÙØØ°Ù,"""تسÙ
Ø ÙÙ Ù
عظÙ
Ø§ÙØ£Ø¬Ùزة Ø¨ØØ°Ù Ø§ÙØ¨ÙØ§ÙØ§Øª Ù
ÙÙØ§Ø Ù
Ø«ÙØ§ÙØ ÙÙ
ÙÙÙ
Ø³ØØ¨ Ù
Ù٠إÙ٠أÙÙÙÙØ© Ø³ÙØ© اÙÙ
ÙÙ
ÙØ§ØªØ أ٠ضغط زر
Ø§ÙØØ°Ù Ø¶Ù
Ù Ø£ÙØ¨ÙÙ
ØµÙØ±. ÙÙÙÙ Ø§ÙØØ°Ù ÙØ§ ÙØ¹Ù٠دائÙ
ا Ø£Ù Ø§ÙØ¨ÙØ§ÙØ§Øª Ø§ÙØ£ØµÙÙØ© ÙÙ
تعد Ù
ÙØ¬Ùدة. براÙ
ج
Ø¥ÙØºØ§Ø¡ Ø§ÙØØ°Ù Ù٠تطبÙÙØ§Øª ÙÙ
Ù٠استخداÙ
ÙØ§ Ù
Ù
ÙØ¨Ù Ù
اÙÙ Ø§ÙØ¬Ùاز Ø£Ù Ù
Ù ÙØ¨Ù Ø§ÙØ¢Ø®Ø±ÙÙ ÙØ§Ø³ØªØ¹Ø§Ø¯Ø©
بعض Ø§ÙØ¨ÙØ§ÙØ§Øª. براÙ
ج Ø¥ÙØºØ§Ø¡ Ø§ÙØØ°Ù Ù
ÙÙØ¯Ø© ÙÙ
Ù
ÙØ§Ù
Ø¨ØØ°Ù Ø¨ÙØ§Ùات بطرÙÙ Ø§ÙØ®Ø·Ø£Ø ÙÙØ£ÙÙØ¦Ù Ø§ÙØ°ÙÙ
تÙ
ØªØ®Ø±ÙØ¨ Ø¨ÙØ§ÙاتÙÙ
Ø Ù
ث٠Ù
ØµÙØ± تÙ
إجراء٠عÙÙ
ØØ°Ù Ø§ÙØµÙر Ù
Ù ÙØ§Ù
ÙØ±ØªÙ. ÙÙÙÙ ÙØ°Ù Ø§ÙØ¨Ø±Ø§Ù
ج تشÙÙ
ØªÙØ¯ÙØ¯Ø§Ù ÙØ£Ù شخص ÙØ±ØºØ¨ Ø¨ØØ°Ù Ø¨ÙØ§ÙØ§ØªÙ Ø§ÙØ³Ø±ÙØ©
بشÙ٠دائÙ
. Ø§ÙØ¸Ø± دÙÙÙ: ÙÙÙ ØªØØ°Ù Ø¨ÙØ§Ùات٠بشÙ
٠آÙ
Ù ÙÙØµØ§Ø¦Ø ØÙÙ ÙÙÙÙØ© Ù
Ø³Ø Ø§ÙØ¨ÙØ§ÙØ§ØªØ ÙÙ
عÙÙÙ
ات ع٠ÙÙÙÙØ© عÙ
٠براÙ
ج Ø¥ÙØºØ§Ø¡ Ø§ÙØØ°Ù Ø¹ÙÙ
Ø§ÙØ£Ø¬Ùزة Ø§ÙØØ¯ÙØ«Ø©."" (EFF)"
+undo,Verb,,,
+unexpected,Adjective,,,
+unfollow,Verb,,,
+uninstall,Verb,,,
+unit test,Noun,http://en.wikipedia.org/wiki/Unit_test,,
+unknown,Adjective,,,
+unlink,Verb,[Signal],,
+unlock,Verb,,Ù٠اÙÙÙÙ,
+unlocked,Adjective,,ØºÙØ± Ù
ÙÙÙ,
+unmount device,Verb,,ÙÙ Ø§ÙØªØ¬ÙÙØ²Ø©,
+"unmount, unmounting",Verb,,,
+unpack,Verb,,,
+unparseable,Adjective,,,
+unpin,Verb,"Unpin a tab, a site in a browser.",,
+unreachable,Adjective,,,
+unrecognized,Adjective,,,
+unrecognized ,Adjective,,,
+unrestricted,Adjective,,,
+unsafe,Adjective,,,
+untrusted,Adjective,,,
+up-to-date,Adjective,,,
+update,Noun,[Signal],,
+update,Verb,[Signal],,
+upgrade,Noun,[Signal],,
+upgrade,Verb,[Signal],,
+upload,Noun,[Globaleaks] [Orbot],,
+upload,Verb,[Globaleaks] [Orbot],Ø±ÙØ¹,
+uploader,Noun,,,
+uploading,Noun,,,
+upstream proxy,Noun,,,
+uptime,Noun,,,
+usability,Noun,,,
+user,Noun,,,
+user ID,Noun,user identification,Ù
عرÙÙ٠اÙÙ
ستخدÙ
,
+user agent,Noun,,,
+user data,Noun,,,
+user guide,Noun,,دÙÙ٠اÙÙ
ستخدÙ
,
+user manual,Noun,,,
+user settings,Noun,,إعدادات اÙÙ
ستخدÙ
,
+username,Noun,[Globaleaks] [Orbot],إسÙ
اÙÙ
ستخدÙ
,
+validation,Noun,,,
+variable,Noun,,,
+"vcard, v-card",Noun,,,
+verification,Noun,[Signal],,
+verified,Adjective,[Signal],,
+verify,Verb,[Signal],,
+version,Noun,[Signal],,
+version,Verb,Create a new version of a record or file while still maintaining
past versions of the file.,,
+versioned,Adjective,,Ù
ÙØ¬Ø²ÙÙØ¡,
+video chat,Noun,,,
+view,Noun,,,
+view,Verb,,,
+viewport,Noun,,,
+volume,Noun,,,
+volunteer,Noun,,,
+vulnerability,Noun,,,
+vulnerable,Adjective,,,
+wallet,Noun,,,
+warning,Noun,,ØªØØ°Ùر,
+watch,Verb,,,
+watch list,Noun,,ÙØ§Ø¦ØØ© اÙÙ
Ø´Ø§ÙØ¯Ø§Øª,
+watermark,Noun,,Ø¹ÙØ§Ù
Ø© Ù
Ø§Ø¦ÙØ©,
+wear leveling,Noun,"Some forms of digital storage, like the flash memory used
in solid-state drives (SSD) and USB sticks, can wear out if overwritten many
times. Wear leveling is a method that spreads the writing of data evenly across
all of the media to prevent one part of it being overwritten too many times.
Its benefit is that it can make devices last longer. The danger for
security-conscious users is that wear leveling interferes with secure erase
programs, which deliberately try to overwrite sensitive files with junk data in
order to permanently erase them. Rather than trusting secure erase programs
with files stored on SSD or USB flash drives, it can be better to use full-disk
encryption. Encryption avoids the difficulty of secure erasing by making any
file on the drive difficult to recover without the correct passphrase.
+Source EFF.",ØªÙØ²Ùع Ø§ÙØ§ÙØªÙØ§Ù,"""ÙÙ
ÙÙ ÙØ¨Ø¹Ø¶ Ø£Ø´ÙØ§Ù
Ø§ÙØªØ®Ø²ÙÙ Ø§ÙØ±ÙÙ
Ù (Ù
Ø«Ù Ø°Ø§ÙØ±Ø© اÙÙÙØ§Ø´ اÙÙ
ستخدÙ
Ø©
ÙÙ Ø£ÙØ±Ø§Øµ Ø§ÙØØ§ÙØ© Ø§ÙØµÙبة SSD ÙØ°ÙØ§ÙØ± USB) أ٠تتÙÙ
Ø¹ÙØ¯ اÙÙØªØ§Ø¨Ø© عÙÙÙØ§ بشÙÙ Ù
ØªÙØ±Ø± ÙÙ
رات Ø¹Ø¯ÙØ¯Ø©.
ØªÙØ²Ùع Ø§ÙØ§ÙØªÙØ§Ù Ù٠أسÙÙØ¨ ÙÙØ²Ø¹ ÙØªØ§Ø¨Ø©
Ø§ÙØ¨ÙØ§ÙØ§Øª بشÙÙ Ù
تسا٠عبر جÙ
ÙØ¹ أجزاء ÙØ³ÙØ·
Ø§ÙØªØ®Ø²ÙÙ ÙÙ
ÙØ¹ تÙÙ ÙØ³Ù
ÙØ§ØØ¯ عبر اÙÙØªØ§Ø¨Ø© عÙÙÙ Ù
Ø±Ø§Ø±Ø§Ù ÙØªÙراراÙ. ÙØ§Ø¦Ø¯ØªÙ Ù٠أÙÙ ÙØ¬Ø¹Ù Ø§ÙØ£Ø¬Ùزة
تدÙÙ
ÙÙØªØ±Ø© أطÙÙ. خطر ذÙ٠عÙ٠اÙÙ
ستخدÙ
Ø§ÙØ°Ù
ÙÙÙ
Ù Ø§ÙØ£Ù
Ù ÙÙ Ø£Ù ØªÙØ²Ùع Ø§ÙØ§ÙØªÙØ§Ù ÙØªØ¯Ø®Ù ببراÙ
ج Ø§ÙØØ°Ù Ø§ÙØ¢Ù
ÙØ ÙØ§ÙØªÙ ØªØØ§ÙÙ Ø£Ù ØªÙØªØ¨ ÙÙ٠اÙÙ
ÙÙØ§Øª Ø§ÙØØ³Ø§Ø³Ø© Ø¨Ø¨ÙØ§Ùات Ø¹Ø´ÙØ§Ø¦ÙØ© ÙØ¶Ù
Ø§Ù ØØ°ÙÙØ§
بشÙ٠دائÙ
. Ø¨Ø¯Ù Ø§ÙØ§Ø¹ØªÙ
اد عÙ٠براÙ
ج Ø§ÙØØ°Ù Ø§ÙØ¢Ù
Ù ÙÙØ
ªØ¹Ø§Ù
Ù Ù
ع اÙÙ
ÙÙØ§Øª اÙÙ
Ø®Ø²ÙØ© عÙÙ Ø³ÙØ§Ùات SSD Ø£Ù
USBØ ÙÙØ¶Ù استخداÙ
تشÙÙØ± اÙÙØ±Øµ بأÙÙ
ÙÙ. ÙØªØ¬Ùب
Ø§ÙØªØ´ÙÙØ± ØµØ¹ÙØ¨Ø© ØØ°Ù اÙÙ
ÙÙØ§Øª بشÙ٠آÙ
٠عبر جعÙ
استرجاع Ø£Ù Ù
Ù٠عÙÙ Ø§ÙØ³ÙØ§ÙØ© صعبا٠دÙ٠عبارة
اÙÙ
Ø±ÙØ± Ø§ÙØµØÙØØ©."" (Source: EFF)"
+web,Noun,,,
+web browser,Noun,[Orbot],,
+web connectivity,Noun,,,
+"web connectivity, connectivity",Noun,[Orbot],,
+web interface,Noun,,,
+web-based proxy,Noun,"A website that lets its users access other, blocked or
censored websites. Generally, the web proxy will let you type a web address (or
URL) onto a web page, and then redisplay that web address on the proxy page.
Easier to use than most other censorship-circumventing services.
+Source EFF.",,
+webmail provider,Noun,,Ù
Ø²ÙØ¯ خدÙ
Ø© Ø§ÙØ¨Ø±Ùد Ø§ÙØ¥ÙترÙÙÙ
عبر Ø§ÙØ´Ø¨ÙØ© Ø§ÙØ¹ÙÙØ¨ÙØªÙØ©,
+webserver,Noun,,,
+website,Noun,,Ù
ÙÙØ¹ اÙÙÙØ¨Ù,
+week,Noun,,,
+whistleblower,Noun,[Globaleaks],,
+whistleblowing,Noun,[Globaleaks],,
+whitelist,Noun,,,
+whole device,Noun,As in âwhole device encryption.â,,
+widget,Noun,,,
+wildcards,Noun,,ØØ±ÙÙ Ø§ÙØ¨Ø¯Ù,
+window,Noun,,,
+wipe,Verb,,Ø·Ù
س,
+wizard / assistant,Noun,A âgetting startedâ wizard / assitant,ØÙÙÙ
/ Ù
رشد,
+work,Verb,,,
+work-around,Noun,,,
+world wide web,Noun,,,
+world-leading,Adjective,,,
+wrapper,Noun,,,
+x,Noun,,,
+year,Noun,,,
+yes,Noun,,ÙØ¹Ù
,
+zero day,Noun,"A flaw in a piece of software or hardware that was previously
unknown to the maker of the product. Until the manufacturers hear of the flaw
and fix it, attackers can use it for their own purposes.
+Source EFF.",,
+zip,Verb,To compress a file or directory so that is is smaller in size.
[Signal],,
+â¦,Conjunction,"Punctuation, not a conjunction, however âpunctionationâ
is not an option in Transifex",,
_______________________________________________
tor-commits mailing list
[email protected]
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits