commit 656781d8a9069bb4da19c76e47c02a05338bec80
Author: Translation commit bot <[email protected]>
Date: Sat Jun 25 18:45:30 2016 +0000
Update translations for https_everywhere
---
nn/https-everywhere.dtd | 26 +++++++++++++-------------
nn/ssl-observatory.dtd | 27 ++++++++++++++-------------
2 files changed, 27 insertions(+), 26 deletions(-)
diff --git a/nn/https-everywhere.dtd b/nn/https-everywhere.dtd
index f1c7815..c39c8ca 100644
--- a/nn/https-everywhere.dtd
+++ b/nn/https-everywhere.dtd
@@ -5,17 +5,17 @@
<!ENTITY https-everywhere.about.created_by "Laga av">
<!ENTITY https-everywhere.about.and ", og">
<!ENTITY https-everywhere.about.librarians "Regelsettbibliotekarar">
-<!ENTITY https-everywhere.about.add_new_rule "Add New Rule">
+<!ENTITY https-everywhere.about.add_new_rule "Legg til ny regel">
<!ENTITY https-everywhere.about.thanks "Takk til">
-<!ENTITY https-everywhere.about.many_contributors "Many many contributors,
including">
-<!ENTITY https-everywhere.about.noscript "Also, portions of HTTPS Everywhere
are based on code from NoScript, by Giorgio Maone and others. We are grateful
for their excellent work!">
+<!ENTITY https-everywhere.about.many_contributors "Mange mange bidragsytarar,
medrekna">
+<!ENTITY https-everywhere.about.noscript "Dessutan er delar av HTTPS
Everywhere basert på kode frå NoScript av Giorgio Maone og andre. Me er
takksame for det framifrå arbeidet deira!">
<!ENTITY https-everywhere.about.contribute "Om du likar HTTPS Everywhere,
kunne du kanskje vurdere å ">
<!ENTITY https-everywhere.about.donate_tor "Donere til Tor">
<!ENTITY https-everywhere.about.tor_lang_code "en">
<!ENTITY https-everywhere.about.or "eller">
<!ENTITY https-everywhere.about.donate_eff "Donerer til EFF">
-<!ENTITY https-everywhere.menu.donate_eff_imperative "Donate to EFF">
+<!ENTITY https-everywhere.menu.donate_eff_imperative "Doner til EFF">
<!ENTITY https-everywhere.menu.about "Om HTTPS Everywhere">
<!ENTITY https-everywhere.menu.observatory "SSL Observatory Innstillingar">
<!ENTITY https-everywhere.menu.globalEnable "Slå på HTTPS Everywhere">
@@ -39,18 +39,18 @@
<!ENTITY https-everywhere.prefs.reset_default "Still tilbake til standard">
<!ENTITY https-everywhere.prefs.view_xml_source "Vis XML-kjelde">
-<!ENTITY https-everywhere.chrome.stable_rules "Stable rules">
-<!ENTITY https-everywhere.chrome.stable_rules_description "Force encrypted
connections to these websites:">
-<!ENTITY https-everywhere.chrome.experimental_rules "Experimental rules">
-<!ENTITY https-everywhere.chrome.experimental_rules_description "May cause
warnings or breakage. Disabled by default.">
-<!ENTITY https-everywhere.chrome.add_rule "Add a rule for this site">
-<!ENTITY https-everywhere.chrome.add_new_rule "Add a new rule for this site">
-<!ENTITY https-everywhere.chrome.always_https_for_host "Always use https for
this host">
+<!ENTITY https-everywhere.chrome.stable_rules "Støduge reglar">
+<!ENTITY https-everywhere.chrome.stable_rules_description "Tving krypterte
tilkoplingar åt desse nettstadane:">
+<!ENTITY https-everywhere.chrome.experimental_rules "Reglar på prøve">
+<!ENTITY https-everywhere.chrome.experimental_rules_description "Kan vera
årsak åt åtvaringar eller brot. Slegne av som standard.">
+<!ENTITY https-everywhere.chrome.add_rule "Legg til ein regel for denne
nettstaden">
+<!ENTITY https-everywhere.chrome.add_new_rule "Legg til ein ny regel for denne
nettstaden">
+<!ENTITY https-everywhere.chrome.always_https_for_host "Nytt alltid https for
denne verten">
<!ENTITY https-everywhere.chrome.host "Vert:">
<!ENTITY https-everywhere.chrome.show_advanced "Vis avansert">
<!ENTITY https-everywhere.chrome.hide_advanced "Gøym avansert">
-<!ENTITY https-everywhere.chrome.rule_name "Rule name">
-<!ENTITY https-everywhere.chrome.regex "Matching regex">
+<!ENTITY https-everywhere.chrome.rule_name "Namn på regelen:">
+<!ENTITY https-everywhere.chrome.regex "Som passar med regex">
<!ENTITY https-everywhere.chrome.redirect_to "Omdiriger til">
<!ENTITY https-everywhere.chrome.status_cancel_button "Avbryt">
diff --git a/nn/ssl-observatory.dtd b/nn/ssl-observatory.dtd
index baa4f3b..dd31e54 100644
--- a/nn/ssl-observatory.dtd
+++ b/nn/ssl-observatory.dtd
@@ -3,9 +3,9 @@
<!ENTITY ssl-observatory.popup.later "Spør meg seinare">
<!ENTITY ssl-observatory.popup.no "Nei">
-<!ENTITY ssl-observatory.popup.text "HTTPS Everywhere can detect attacks
-against your browser by sending the certificates you receive to the
-Observatory. Turn this on?">
+<!ENTITY ssl-observatory.popup.text "HTTPS Everywhere kan uppdaga åtak
+på nettlesaren din ved å sende sertifikati du mottek åt Observatoriet.
+Slå på dette?">
<!--<!ENTITY ssl-observatory.popup.text
"EFF's SSL Observatory can detect attacks against HTTPS websites by collecting
@@ -20,29 +20,30 @@ to turn it on?">-->
<!-- Observatory preferences dialog -->
<!ENTITY ssl-observatory.prefs.adv_priv_opts1
-"It is safe to enable this, unless you use a very
-intrusive corporate network:">
+"Det er trygt å slå på dette, med mindre du nyttar
+eit sers inngripande verksemdnettverk:">
<!ENTITY ssl-observatory.prefs.adv_priv_opts2
-"Safe, unless you use a corporate network with secret intranet server names:">
+"Trygt, med mindre du nyttar eit verksemdnettverk med løynlege intranett-
+tenarnamn:">
<!ENTITY ssl-observatory.prefs.alt_roots
-"Submit and check certificates signed by non-standard root CAs">
+"Send inn og sjekk attestar underskrevne av ikkjestandard rot-CA'ar">
<!ENTITY ssl-observatory.prefs.alt_roots_tooltip
-"It is safe (and a good idea) to enable this option, unless you use an
intrusive corporate network or Kaspersky antivirus software that monitors your
browsing with a TLS proxy and a private root Certificate Authority. If enabled
on such a network, this option might publish evidence of which https:// domains
were being visited through that proxy, because of the unique certificates it
would produce. So we leave it off by default.">
+"Det er trygt (og ein god idé) å slå på dette valet, med mindre du nyttar
eit inngripande verksemdnettverk eller Kaspersky motvirusprogramvare som
yvervakar nettlesingi di med ein TLS-proxy og ein privat
rotsertifikatautoritet. Um det er slege på på soleis eit nettverk, kan dette
valet gjeve ut prov på kva https://-domene som vart vitja gjennum den proxyen,
på grunn av dei sereigne sertifikati det ville laga. So me let det vera av som
standard.">
-<!ENTITY ssl-observatory.prefs.anonymous "Check certificates using Tor for
anonymity">
+<!ENTITY ssl-observatory.prefs.anonymous "Sjekk sertifikat ved hjelp av Tor
for anonymitet">
<!ENTITY ssl-observatory.prefs.anonymous_unavailable
-"Check certificates using Tor for anonymity (requires Tor)">
+"Sjekk sertifikat ved hjelp av Tor for anonymitet (krev Tor)">
<!ENTITY ssl-observatory.prefs.anonymous_tooltip
-"This option requires Tor to be installed and running">
+"Dette valet krev at Tor er installert og køyrar">
<!ENTITY ssl-observatory.prefs.asn
-"When you see a new certificate, tell the Observatory which ISP you are
connected to">
+"NÃ¥r du ser eit nytt sertifikat, fortel Observatoriet kva for ISP du er kopla
Ã¥t.">
<!ENTITY ssl-observatory.prefs.asn_tooltip
-"This will fetch and send the "Autonomous System number" of your
network. This will help us locate attacks against HTTPS, and to determine
whether we have observations from networks in places like Iran and Syria where
attacks are comparatively common.">
+"Dette vil henta og senda det "Autonome Systemtalet" åt nettverket
ditt. Dette vil hjelpe oss med å plassera åtak mot HTTPS, og med å avgjere
um me hev åtgangingar frå nettverk på stadar soleis som Iran og Syria, kor
åtak er jamførd vanlege.">
<!ENTITY ssl-observatory.prefs.show_cert_warning
"Show a warning when the Observatory detects a revoked certificate not caught
by your browser">
_______________________________________________
tor-commits mailing list
[email protected]
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits