commit ae63c363fe7e069d1c3ffca9997a4c853b82b57f
Author: Translation commit bot <[email protected]>
Date:   Sat Jul 8 23:15:24 2017 +0000

    Update translations for https_everywhere
---
 mk/https-everywhere.properties | 10 +++++-----
 mk/ssl-observatory.dtd         | 24 ++++++++++++------------
 2 files changed, 17 insertions(+), 17 deletions(-)

diff --git a/mk/https-everywhere.properties b/mk/https-everywhere.properties
index 774ffb6..5be146e 100644
--- a/mk/https-everywhere.properties
+++ b/mk/https-everywhere.properties
@@ -1,8 +1,8 @@
-https-everywhere.menu.globalEnable = Овозможи HTTPS насекаде
-https-everywhere.menu.globalDisable = Оневозможи HTTPS 
насекаде
+https-everywhere.menu.globalEnable = Овозможи HTTPS Everywhere
+https-everywhere.menu.globalDisable = Оневозможи HTTPS Everywhere
 https-everywhere.menu.enableDisable = Овозможи / Оневозможи 
правила
 https-everywhere.menu.noRules = (Нема правила за странава)
 https-everywhere.menu.unknownRules = (Непознати правила за 
стрнава)
-https-everywhere.toolbar.hint = HTTPS насекаде е 
активирано.  Може да се активира на секоја 
страна поединечно со кликнување на иконата 
во адресната линија.
-https-everywhere.migration.notification0 = In order to implement a crucial 
fix, this update resets your HTTPS Everywhere rule preferences to their default 
values.
-https-everywhere.menu.ruleset-tests = Run HTTPS Everywhere Ruleset Tests
+https-everywhere.toolbar.hint = HTTPS Everywhere е активирано.  
Може да се активира на секоја страна 
поединечно со кликнување на иконата во 
адресната линија.
+https-everywhere.migration.notification0 = Со цел да се 
оствари клучна поправка, ова ажурирање ги 
враќа на стандардните вредности 
параметрите за правилата на HTTPS Everywhere.
+https-everywhere.menu.ruleset-tests = Стартувај провека за 
HTTPS Everywhere правилник
diff --git a/mk/ssl-observatory.dtd b/mk/ssl-observatory.dtd
index a241a46..82e7d82 100644
--- a/mk/ssl-observatory.dtd
+++ b/mk/ssl-observatory.dtd
@@ -1,11 +1,11 @@
 <!-- Observatory popup window -->
-<!ENTITY ssl-observatory.popup.details "Details and Privacy Information">
-<!ENTITY ssl-observatory.popup.later "Ask Me Later">
-<!ENTITY ssl-observatory.popup.no "No">
+<!ENTITY ssl-observatory.popup.details "Детали и информации 
за приватност">
+<!ENTITY ssl-observatory.popup.later "Прашај ме подоцна">
+<!ENTITY ssl-observatory.popup.no "Не">
 
-<!ENTITY ssl-observatory.popup.text "HTTPS Everywhere can detect attacks
-against your browser by sending the certificates you receive to the
-Observatory.  Turn this on?">
+<!ENTITY ssl-observatory.popup.text "HTTPS Everywhere може да 
пронајде напади против твојот пребарувач
+преку праќање на примените сертификати во 
опсерваторијата.
+Вклучи го ова?">
 
 <!--<!ENTITY ssl-observatory.popup.text 
 "EFF's SSL Observatory can detect attacks against HTTPS websites by collecting
@@ -13,21 +13,21 @@ and auditing the certificates being presented to your 
browser. Would you like
 to turn it on?">-->
 
 <!ENTITY ssl-observatory.popup.title 
-"Should HTTPS Everywhere use the SSL Observatory?">
+"Треба ли HTTPS Everywhere да користи SSL Observatory?">
 
-<!ENTITY ssl-observatory.popup.yes "Yes">
+<!ENTITY ssl-observatory.popup.yes "Да">
 
 <!-- Observatory preferences dialog -->
 
 <!ENTITY ssl-observatory.prefs.adv_priv_opts1
-"It is safe to enable this, unless you use a very
-intrusive corporate network:">
+"Ова е безбедно да се вклучи, освен ако 
користиш
+високо наметлива корпоративната мрежа:">
 
 <!ENTITY ssl-observatory.prefs.adv_priv_opts2
-"Safe, unless you use a corporate network with secret intranet server names:">
+"Безбедно, освен ако користиш корпоративна 
мрежа со тајни интранет серверни имиња:">
 
 <!ENTITY ssl-observatory.prefs.alt_roots 
-"Submit and check certificates signed by non-standard root CAs">
+"Поднеси и провери сертификати потпишани 
од нестандардни основни сертификати">
 
 <!ENTITY ssl-observatory.prefs.alt_roots_tooltip 
 "It is safe (and a good idea) to enable this option, unless you use an 
intrusive corporate network or Kaspersky antivirus software that monitors your 
browsing with a TLS proxy and a private root Certificate Authority.  If enabled 
on such a network, this option might publish evidence of which https:// domains 
were being visited through that proxy, because of the unique certificates it 
would produce.  So we leave it off by default.">

_______________________________________________
tor-commits mailing list
[email protected]
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits

Reply via email to