diff options
author | Yuri Chornoivan <yurchor@ukr.net> | 2020-09-19 20:13:43 +0300 |
---|---|---|
committer | Yuri Chornoivan <yurchor@ukr.net> | 2020-09-19 20:13:43 +0300 |
commit | 38daaa6646395608812082dd0d0d80aa9b732d11 (patch) | |
tree | 42153af8764a90a2e0d7da409337b3c52e5280ba | |
parent | 019209479302a289cc6329352ef0d8bb45abf1d0 (diff) | |
download | msec-38daaa6646395608812082dd0d0d80aa9b732d11.tar msec-38daaa6646395608812082dd0d0d80aa9b732d11.tar.gz msec-38daaa6646395608812082dd0d0d80aa9b732d11.tar.bz2 msec-38daaa6646395608812082dd0d0d80aa9b732d11.tar.xz msec-38daaa6646395608812082dd0d0d80aa9b732d11.zip |
Update Asturian translation from Tx
-rw-r--r-- | po/ast.po | 1144 |
1 files changed, 758 insertions, 386 deletions
@@ -1,5 +1,6 @@ # SOME DESCRIPTIVE TITLE. -# Copyright (C) YEAR ORGANIZATION +# Copyright (C) YEAR THE PACKAGE'S COPYRIGHT HOLDER +# This file is distributed under the same license as the msec package. # # Translators: # enolp <enolp@softastur.org>, 2015,2020 @@ -8,564 +9,400 @@ msgid "" msgstr "" "Project-Id-Version: Mageia\n" -"POT-Creation-Date: 2018-03-08 14:08+CET\n" -"PO-Revision-Date: 2020-04-02 01:32+0000\n" +"Report-Msgid-Bugs-To: \n" +"POT-Creation-Date: 2020-06-15 22:29+0200\n" +"PO-Revision-Date: 2020-08-01 15:55+0000\n" "Last-Translator: enolp <enolp@softastur.org>\n" "Language-Team: Asturian (http://www.transifex.com/MageiaLinux/mageia/" "language/ast/)\n" "Language: ast\n" "MIME-Version: 1.0\n" "Content-Type: text/plain; charset=UTF-8\n" -"Content-Transfer-Encoding: ENCODING\n" -"Generated-By: pygettext.py 1.5\n" +"Content-Transfer-Encoding: 8bit\n" "Plural-Forms: nplurals=2; plural=(n != 1);\n" - -#: ../src/msec/config.py:46 -msgid "Modified system files" + +#: ../src/msec/msec.py:87 ../src/msec/msecperms.py:96 +#, python-format +msgid "Invalid security level '%s'." msgstr "" -#: ../src/msec/config.py:47 -msgid "No changes in system files" +#: ../src/msec/msec.py:114 ../src/msec/msecperms.py:121 +#, python-format +msgid "Msec: Mageia Security Center (%s)\n" msgstr "" -#: ../src/msec/config.py:60 ../src/msec/tools.py:36 -msgid "Disabled" +#: ../src/msec/msec.py:115 ../src/msec/msecperms.py:122 +msgid "Error: This application must be executed by root!" msgstr "" -#: ../src/msec/config.py:222 ../src/msec/config.py:436 -msgid "Unable to load configuration file %s: %s" +#: ../src/msec/msec.py:116 ../src/msec/msecperms.py:123 +msgid "Run with --help to get help." msgstr "" -#: ../src/msec/config.py:236 ../src/msec/config.py:346 -#: ../src/msec/config.py:455 -msgid "Bad config option: %s" +#: ../src/msec/msec.py:142 +#, python-format +msgid "Level '%s' not found, aborting." msgstr "" -#: ../src/msec/config.py:271 ../src/msec/config.py:385 -#: ../src/msec/config.py:481 -msgid "Unable to save %s: %s" +#: ../src/msec/msec.py:144 +#, python-format +msgid "Switching to '%s' level." msgstr "" -#: ../src/msec/config.py:331 -msgid "loading exceptions file %s: %s" +#: ../src/msec/msec.py:151 +#, python-format +msgid "No custom file permissions for level '%s'." msgstr "" -#: ../src/msec/config.py:332 -msgid "No exceptions loaded" +#: ../src/msec/msec.py:152 +#, python-format +msgid "Saving file permissions to '%s' level." +msgstr "" + +#: ../src/msec/msec.py:192 ../src/msec/msecperms.py:166 +msgid "Unable to save config!" +msgstr "¡Nun pue guardase la configuración!" + +#: ../src/msec/msec.py:194 +msgid "Unable to save file system permissions!" msgstr "" #: ../src/msec/help.py:14 -msgid "Include current directory into user PATH by default" +msgid "" +"Defines the base security level, on top of which the current configuration " +"is based." msgstr "" #: ../src/msec/help.py:16 -msgid "Enable checking for files/directories writable by everybody." +msgid "" +"Enable sectools checks. This check will run all sectool checks for a " +"security level configuration. The security level to be used during this test " +"is determined by the CHECK_SECTOOL_LEVELS variable." msgstr "" #: ../src/msec/help.py:18 -msgid "Allow only users in wheel group to su to root." +msgid "" +"Defines the sectool level to use during the periodic security check. You may " +"use the sectool-gui application to select individual tests for each level. " +"If this variable is not defined, the default level defined in sectool " +"configuration will be used." msgstr "" #: ../src/msec/help.py:20 -msgid "" -"Allow users in wheel group to use sudo. If this option is set to 'yes', the " -"users in wheel group are allowed to use sudo and run commands as root by " -"using their passwords. If this option to set to 'without-password', the " -"users can use sudo without being asked for their password. WARNING: using " -"sudo without any password makes your system very vulnerable, and you should " -"only use this setting if you know what you are doing!" +msgid "Accept bogus IPv4 error messages." msgstr "" #: ../src/msec/help.py:22 -msgid "Ask for root password when going to single user level (man sulogin(8))." +msgid "Accept broadcasted ICMP echo." msgstr "" #: ../src/msec/help.py:24 -msgid "" -"Enable password-related checks, such as empty passwords and strange super-" -"user accounts." +msgid "Accept ICMP echo." msgstr "" #: ../src/msec/help.py:26 -msgid "Show security notifications in system tray using libnotify." +msgid "" +"Allow remote root login via sshd. If yes, login is allowed. If without-" +"password, only public-key authentication logins are allowed. See " +"sshd_config(5) man page for more information." msgstr "" #: ../src/msec/help.py:28 -msgid "" -"Enable sectools checks. This check will run all sectool checks for a " -"security level configuration. The security level to be used during this test " -"is determined by the CHECK_SECTOOL_LEVELS variable." +msgid "Enable IP spoofing protection." msgstr "" #: ../src/msec/help.py:30 -msgid "Fix owner and group of unowned files to use nobody/nogroup." +msgid "Enable logging of strange network packets." msgstr "" #: ../src/msec/help.py:32 -msgid "Accept ICMP echo." +msgid "Enable periodic permission checking for files specified in msec policy." msgstr "" #: ../src/msec/help.py:34 -msgid "Enable checking for changes in firewall settings." +msgid "" +"Enable msec to enforce file permissions to the values specified in the msec " +"security policy." msgstr "" #: ../src/msec/help.py:36 msgid "" -"Enable verification for changes in the installed RPM packages. This will " -"notify you when new packages are installed or removed." +"Patterns to exclude from disk checks. This parameter is parsed as a regex " +"(7), so you may use complex expressions." msgstr "" #: ../src/msec/help.py:38 -msgid "Accept broadcasted ICMP echo." +msgid "" +"Enable permission checking on users' files that should not be owned by " +"someone else, or writable." msgstr "" #: ../src/msec/help.py:40 -msgid "Enable periodic security check results to terminal." +msgid "Enable checking for additions/removals of suid root files." msgstr "" #: ../src/msec/help.py:42 -msgid "" -"Enable msec to enforce file permissions to the values specified in the msec " -"security policy." +msgid "Enable checksum verification for suid files." msgstr "" #: ../src/msec/help.py:44 -msgid "Log journal messages on console terminal 12." +msgid "Enable checking for additions/removals of sgid files." msgstr "" #: ../src/msec/help.py:46 -msgid "Set the root umask." +msgid "Enable checking for files/directories writable by everybody." msgstr "" #: ../src/msec/help.py:48 -msgid "Enable checking for additions/removals of sgid files." +msgid "Enable checking for unowned files." msgstr "" #: ../src/msec/help.py:50 -msgid "Activate ethernet cards promiscuity check." +msgid "Fix owner and group of unowned files to use nobody/nogroup." msgstr "" #: ../src/msec/help.py:52 -msgid "Enable checking for empty passwords in /etc/shadow (man shadow(5))." +msgid "Activate ethernet cards promiscuity check." msgstr "" #: ../src/msec/help.py:54 -msgid "Allow autologin." +msgid "Enable checking for open network ports." msgstr "" #: ../src/msec/help.py:56 -msgid "" -"Define the default retention period for logs, in weeks. Some countries " -"require that the log files should be kept for 12 months, other do not have " -"such strict requirements. This variable defines the number of past log files " -"that should be kept by logrotate on the system." +msgid "Ignore changes in process IDs when checking for open network ports." msgstr "" #: ../src/msec/help.py:58 -msgid "Enable checking for additions/removals of suid root files." +msgid "Enable checking for changes in firewall settings." msgstr "" #: ../src/msec/help.py:60 msgid "" -"Enable permission checking on users' files that should not be owned by " -"someone else, or writable." +"Enable password-related checks, such as empty passwords and strange super-" +"user accounts." msgstr "" #: ../src/msec/help.py:62 -msgid "Enable IP spoofing protection." +msgid "Enable checking for empty passwords in /etc/shadow (man shadow(5))." msgstr "" #: ../src/msec/help.py:64 -msgid "" -"Allow to export display when passing from the root account to the other " -"users. See pam_xauth(8) for more details." +msgid "Enable checking for known rootkits using chkrootkit." msgstr "" #: ../src/msec/help.py:66 -msgid "Set the user umask." +msgid "" +"Enable verification for changes in the installed RPM packages. This will " +"notify you when new packages are installed or removed." msgstr "" #: ../src/msec/help.py:68 -msgid "Allow direct root login on terminal." +msgid "" +"Enable verification of integrity of installed RPM packages. This will notify " +"you if checksums of the installed files were changed, showing separate " +"results for binary and configuration files." msgstr "" #: ../src/msec/help.py:70 -msgid "Enable checking for changes in system groups." +msgid "Enable checking for dangerous options in users' .rhosts/.shosts files." msgstr "" #: ../src/msec/help.py:72 -msgid "" -"Enable verification of integrity of installed RPM packages. This will notify " -"you if checksums of the installed files were changed, showing separate " -"results for binary and configuration files." +msgid "Enable checking for changes in system users." msgstr "" #: ../src/msec/help.py:74 -msgid "Enables logging of periodic checks to system log." +msgid "Enable checking for changes in system groups." msgstr "" #: ../src/msec/help.py:76 -msgid "" -"Creates the symlink /etc/security/msec/server to point to /etc/security/msec/" -"server.SERVER_LEVEL. The /etc/security/msec/server is used by chkconfig --" -"add to decide to add a service if it is present in the file during the " -"installation of packages. By default, two presets are provided: local (which " -"only enables local services) and remote (which also enables some remote " -"services considered safe). Note that the allowed services must be placed " -"manually into the server.SERVER_LEVEL files when necessary." +msgid "Enable periodic security check results to terminal." msgstr "" #: ../src/msec/help.py:78 -msgid "" -"Allow remote root login via sshd. If yes, login is allowed. If without-" -"password, only public-key authentication logins are allowed. See " -"sshd_config(5) man page for more information." +msgid "Send security check results by email." msgstr "" #: ../src/msec/help.py:80 -msgid "" -"Set umask option for mounting vfat and ntfs partitions. If umask is '-1', " -"default system umask is used." +msgid "User email to receive security notifications." msgstr "" #: ../src/msec/help.py:82 -msgid "Enable daily security checks." +msgid "Send mail reports even if no changes were detected." msgstr "" #: ../src/msec/help.py:84 -msgid "Enable checking for known rootkits using chkrootkit." +msgid "Enables logging of periodic checks to system log." msgstr "" #: ../src/msec/help.py:86 -msgid "Enable checking for unowned files." +msgid "Show security notifications in system tray using libnotify." msgstr "" #: ../src/msec/help.py:88 -msgid "" -"Patterns to exclude from disk checks. This parameter is parsed as a regex " -"(7), so you may use complex expressions." +msgid "Enable daily security checks." msgstr "" #: ../src/msec/help.py:90 -msgid "Set shell commands history size. A value of -1 means unlimited." +msgid "Run security checks when machine is running on battery power." msgstr "" #: ../src/msec/help.py:92 -msgid "Ignore changes in process IDs when checking for open network ports." +msgid "Set the user umask." msgstr "" #: ../src/msec/help.py:94 -msgid "Allow X server to accept connections from network on tcp port 6000." +msgid "Set the root umask." msgstr "" #: ../src/msec/help.py:96 -msgid "Enable checksum verification for suid files." +msgid "Include current directory into user PATH by default" msgstr "" #: ../src/msec/help.py:98 -msgid "Set the shell timeout. A value of zero means no timeout." +msgid "" +"Set umask option for mounting vfat and ntfs partitions. If umask is '-1', " +"default system umask is used." msgstr "" #: ../src/msec/help.py:100 -msgid "" -"Set the password minimum length and minimum number of digit and minimum " -"number of capitalized letters, using length,ndigits,nupper format." +msgid "Allow autologin." msgstr "" #: ../src/msec/help.py:102 -msgid "User email to receive security notifications." +msgid "Allow system reboot and shutdown to local users." msgstr "" #: ../src/msec/help.py:104 -msgid "" -"Allow full access to network services controlled by tcp_wrapper (see hosts." -"deny(5)). If yes, all services are allowed. If local, only connections to " -"local services are authorized. If no, the services must be authorized " -"manually in /etc/hosts.allow (see hosts.allow(5))." +msgid "Allow direct root login on terminal." msgstr "" #: ../src/msec/help.py:106 -msgid "Enable logging of strange network packets." +msgid "Allow display managers (sddm and gdm) to display list of local users." msgstr "" #: ../src/msec/help.py:108 msgid "" -"Enforce MSEC file directory permissions on system startup. If this parameter " -"is set to 'enforce', system permissions will be enforced automatically, " -"according to system security settings." +"Allow local users to connect to X server. Accepted arguments: yes (all " +"connections are allowed), local (only local connection), no (no connection)." msgstr "" #: ../src/msec/help.py:110 -msgid "Enable checking for open network ports." +msgid "" +"Allow to export display when passing from the root account to the other " +"users. See pam_xauth(8) for more details." msgstr "" #: ../src/msec/help.py:112 -msgid "Send mail reports even if no changes were detected." +msgid "Allow X server to accept connections from network on tcp port 6000." msgstr "" #: ../src/msec/help.py:114 -msgid "Send security check results by email." +msgid "" +"Allow full access to network services controlled by tcp_wrapper (see hosts." +"deny(5)). If yes, all services are allowed. If local, only connections to " +"local services are authorized. If no, the services must be authorized " +"manually in /etc/hosts.allow (see hosts.allow(5))." msgstr "" #: ../src/msec/help.py:116 -msgid "Enable checking for changes in system users." +msgid "" +"Creates the symlink /etc/security/msec/server to point to /etc/security/msec/" +"server.SERVER_LEVEL. The /etc/security/msec/server is used by chkconfig --" +"add to decide to add a service if it is present in the file during the " +"installation of packages. By default, two presets are provided: local (which " +"only enables local services) and remote (which also enables some remote " +"services considered safe). Note that the allowed services must be placed " +"manually into the server.SERVER_LEVEL files when necessary." msgstr "" #: ../src/msec/help.py:118 -msgid "Allow display managers (sddm and gdm) to display list of local users." +msgid "" +"Enable crontab and at for users. Put allowed users in /etc/cron.allow and /" +"etc/at.allow (see man at(1) and crontab(1))." msgstr "" #: ../src/msec/help.py:120 -msgid "" -"Defines the sectool level to use during the periodic security check. You may " -"use the sectool-gui application to select individual tests for each level. " -"If this variable is not defined, the default level defined in sectool " -"configuration will be used." +msgid "Log journal messages on console terminal 12." msgstr "" #: ../src/msec/help.py:122 -msgid "Accept bogus IPv4 error messages." +msgid "Perform hourly security check for changes in system configuration." msgstr "" #: ../src/msec/help.py:124 -msgid "Allow root access without password for the members of the wheel group." +msgid "Ask for root password when going to single user level (man sulogin(8))." msgstr "" #: ../src/msec/help.py:126 msgid "" -"Set the password history length to prevent password reuse. This is not " -"supported by pam_tcb." +"Use secure location for temporary files. If this parameter is set to 'yes', " +"user home directory will be used for temporary files. Otherwise, /tmp will " +"be used." msgstr "" #: ../src/msec/help.py:128 -msgid "Perform hourly security check for changes in system configuration." +msgid "Set shell commands history size. A value of -1 means unlimited." msgstr "" #: ../src/msec/help.py:130 -msgid "" -"Use secure location for temporary files. If this parameter is set to 'yes', " -"user home directory will be used for temporary files. Otherwise, /tmp will " -"be used." +msgid "Set the shell timeout. A value of zero means no timeout." msgstr "" #: ../src/msec/help.py:132 -msgid "Enable periodic permission checking for files specified in msec policy." +msgid "Enforce MSEC settings on system startup" msgstr "" #: ../src/msec/help.py:134 msgid "" -"Allow local users to connect to X server. Accepted arguments: yes (all " -"connections are allowed), local (only local connection), no (no connection)." +"Enforce MSEC file directory permissions on system startup. If this parameter " +"is set to 'enforce', system permissions will be enforced automatically, " +"according to system security settings." msgstr "" #: ../src/msec/help.py:136 msgid "" -"Use password to authenticate users. Take EXTREME care when disabling " -"passwords, as it will leave the machine vulnerable." +"Define the default retention period for logs, in weeks. Some countries " +"require that the log files should be kept for 12 months, other do not have " +"such strict requirements. This variable defines the number of past log files " +"that should be kept by logrotate on the system." msgstr "" #: ../src/msec/help.py:138 msgid "" -"Defines the base security level, on top of which the current configuration " -"is based." +"Allow users in wheel group to use sudo. If this option is set to 'yes', the " +"users in wheel group are allowed to use sudo and run commands as root by " +"using their passwords. If this option to set to 'without-password', the " +"users can use sudo without being asked for their password. WARNING: using " +"sudo without any password makes your system very vulnerable, and you should " +"only use this setting if you know what you are doing!" msgstr "" #: ../src/msec/help.py:140 -msgid "Run security checks when machine is running on battery power." +msgid "Allow only users in wheel group to su to root." msgstr "" #: ../src/msec/help.py:142 -msgid "Enable checking for dangerous options in users' .rhosts/.shosts files." +msgid "Allow root access without password for the members of the wheel group." msgstr "" #: ../src/msec/help.py:144 -msgid "Allow system reboot and shutdown to local users." +msgid "" +"Use password to authenticate users. Take EXTREME care when disabling " +"passwords, as it will leave the machine vulnerable." msgstr "" #: ../src/msec/help.py:146 -msgid "Enforce MSEC settings on system startup" +msgid "" +"Set the password history length to prevent password reuse. This is not " +"supported by pam_tcb." msgstr "" #: ../src/msec/help.py:148 msgid "" -"Enable crontab and at for users. Put allowed users in /etc/cron.allow and /" -"etc/at.allow (see man at(1) and crontab(1))." -msgstr "" - -#: ../src/msec/libmsec.py:265 -msgid "%s modified so launched command: %s" -msgstr "" - -#: ../src/msec/libmsec.py:274 -msgid "%s modified so should have run command: %s" -msgstr "" - -#: ../src/msec/libmsec.py:376 ../src/msec/libmsec.py:408 -msgid "deleted %s" -msgstr "" - -#: ../src/msec/libmsec.py:394 -msgid "touched file %s" -msgstr "" - -#: ../src/msec/libmsec.py:414 -msgid "made symbolic link from %s to %s" -msgstr "" - -#: ../src/msec/libmsec.py:417 -msgid "moved file %s to %s" -msgstr "" - -#: ../src/msec/libmsec.py:467 ../src/msec/libmsec.py:483 -msgid "set variable %s to %s in %s" -msgstr "" - -#: ../src/msec/libmsec.py:685 -msgid "Error loading plugin '%s' from %s: %s" -msgstr "" - -#: ../src/msec/libmsec.py:702 -msgid "Invalid callback: %s" -msgstr "" - -#: ../src/msec/libmsec.py:711 -msgid "Plugin %s not found" -msgstr "" - -#: ../src/msec/libmsec.py:718 -msgid "Not supported function '%s' in '%s'" -msgstr "" - -#: ../src/msec/libmsec.py:725 ../src/msec/libmsec.py:855 -msgid "In check-only mode, nothing is written back to disk." -msgstr "" - -#: ../src/msec/libmsec.py:752 -msgid "Invalid parameter for %s: '%s'. Valid parameters: '%s'." -msgstr "" - -#: ../src/msec/libmsec.py:785 -msgid "user name %s not found" -msgstr "" - -#: ../src/msec/libmsec.py:797 -msgid "user name not found for id %d" -msgstr "" - -#: ../src/msec/libmsec.py:809 -msgid "group name %s not found" -msgstr "" - -#: ../src/msec/libmsec.py:821 -msgid "group name not found for id %d" -msgstr "" - -#: ../src/msec/libmsec.py:831 -msgid "Unable to check /proc/mounts. Assuming all file systems are local." -msgstr "" - -#: ../src/msec/libmsec.py:870 -msgid "Forcing ownership of %s to %s" -msgstr "" - -#: ../src/msec/libmsec.py:874 -msgid "Error changing user on %s: %s" -msgstr "" - -#: ../src/msec/libmsec.py:876 -msgid "Wrong owner of %s: should be %s" -msgstr "" - -#: ../src/msec/libmsec.py:879 -msgid "Enforcing group on %s to %s" -msgstr "" - -#: ../src/msec/libmsec.py:883 -msgid "Error changing group on %s: %s" -msgstr "" - -#: ../src/msec/libmsec.py:885 -msgid "Wrong group of %s: should be %s" -msgstr "" - -#: ../src/msec/libmsec.py:890 -msgid "Enforcing permissions on %s to %o" -msgstr "" - -#: ../src/msec/libmsec.py:894 -msgid "Error changing permissions on %s: %s" -msgstr "" - -#: ../src/msec/libmsec.py:896 -msgid "Wrong permissions of %s: should be %o" -msgstr "" - -#: ../src/msec/libmsec.py:900 -msgid "Enforcing acl on %s" -msgstr "" - -#: ../src/msec/libmsec.py:914 -msgid "Unable to add filesystem-specific ACL %s to %s" -msgstr "" - -#: ../src/msec/libmsec.py:916 -msgid "Error changing acl on %s: %s" -msgstr "" - -#: ../src/msec/libmsec.py:918 -msgid "Wrong acl of %s" -msgstr "" - -#: ../src/msec/libmsec.py:935 -msgid "bad permissions for '%s': '%s'" -msgstr "" - -#: ../src/msec/libmsec.py:960 -msgid "Non local file: \"%s\". Nothing changed." -msgstr "" - -#: ../src/msec/libmsec.py:1005 -msgid "Checking paths: %s" -msgstr "" - -#: ../src/msec/msec.py:87 ../src/msec/msecperms.py:96 -msgid "Invalid security level '%s'." -msgstr "" - -#: ../src/msec/msec.py:114 ../src/msec/msecperms.py:121 -msgid "Msec: Mageia Security Center (%s)\n" -msgstr "" - -#: ../src/msec/msec.py:115 ../src/msec/msecperms.py:122 -msgid "Error: This application must be executed by root!" -msgstr "" - -#: ../src/msec/msec.py:116 ../src/msec/msecperms.py:123 -msgid "Run with --help to get help." -msgstr "" - -#: ../src/msec/msec.py:142 -msgid "Level '%s' not found, aborting." -msgstr "" - -#: ../src/msec/msec.py:144 -msgid "Switching to '%s' level." -msgstr "" - -#: ../src/msec/msec.py:151 -msgid "No custom file permissions for level '%s'." -msgstr "" - -#: ../src/msec/msec.py:152 -msgid "Saving file permissions to '%s' level." -msgstr "" - -#: ../src/msec/msec.py:192 ../src/msec/msecperms.py:166 -msgid "Unable to save config!" -msgstr "" - -#: ../src/msec/msec.py:194 -msgid "Unable to save file system permissions!" +"Set the password minimum length and minimum number of digit and minimum " +"number of capitalized letters, using length,ndigits,nupper format." msgstr "" #: ../src/msec/msecgui.py:57 @@ -674,10 +511,12 @@ msgid "Save and apply new configuration?" msgstr "" #: ../src/msec/msecgui.py:156 +#, python-format msgid "Unable to load configuration for level '%s'" msgstr "" #: ../src/msec/msecgui.py:162 +#, python-format msgid "Unable to load permissions for level '%s'" msgstr "" @@ -754,14 +593,17 @@ msgid "permission check" msgstr "" #: ../src/msec/msecgui.py:314 +#, python-format msgid "changed %s <b>%s</b> (%s -> %s)" msgstr "" #: ../src/msec/msecgui.py:319 +#, python-format msgid "added %s <b>%s</b> (%s)" msgstr "" #: ../src/msec/msecgui.py:324 +#, python-format msgid "removed %s <b>%s</b>" msgstr "" @@ -778,30 +620,36 @@ msgid "Ignore and quit" msgstr "" #: ../src/msec/msecgui.py:382 +#, python-format msgid "<b>%s:</b> <i>%s</i>\n" msgstr "" #: ../src/msec/msecgui.py:389 +#, python-format msgid "<b>MSEC test run results:</b> <i>%s</i>" msgstr "" #: ../src/msec/msecgui.py:397 msgid "Details" -msgstr "" +msgstr "Detalles" #: ../src/msec/msecgui.py:403 +#, python-format msgid "MSEC messages (%s): %d" msgstr "" #: ../src/msec/msecgui.py:417 +#, python-format msgid "Details (%d changes).." msgstr "" #: ../src/msec/msecgui.py:470 +#, python-format msgid "No base msec level specified, using '%s'" msgstr "" #: ../src/msec/msecgui.py:473 +#, python-format msgid "Detected base msec level '%s'" msgstr "" @@ -818,6 +666,7 @@ msgid "Value" msgstr "" #: ../src/msec/msecgui.py:527 +#, python-format msgid "Invalid option '%s'!" msgstr "" @@ -827,7 +676,7 @@ msgstr "Tornafuéu" #: ../src/msec/msecgui.py:604 ../src/msec/msecgui.py:646 msgid "Configure" -msgstr "" +msgstr "Configurar" #: ../src/msec/msecgui.py:612 msgid "Updates" @@ -850,10 +699,12 @@ msgid "Msec is enabled" msgstr "" #: ../src/msec/msecgui.py:632 +#, python-format msgid "Base security level: '%s'" msgstr "" #: ../src/msec/msecgui.py:640 +#, python-format msgid "Custom settings: %d" msgstr "" @@ -862,6 +713,7 @@ msgid "Never" msgstr "Enxamás" #: ../src/msec/msecgui.py:662 +#, python-format msgid "Check: %s. Last run: %s" msgstr "" @@ -874,6 +726,7 @@ msgid "Run now" msgstr "" #: ../src/msec/msecgui.py:694 +#, python-format msgid "Unable to read log file: %s" msgstr "" @@ -882,6 +735,7 @@ msgid "Periodic check results" msgstr "" #: ../src/msec/msecgui.py:727 +#, python-format msgid "" "Do you want to run the <b>%s</b> periodic check? Please note that it could " "take a considerable time to finish." @@ -945,7 +799,7 @@ msgstr "" #: ../src/msec/msecgui.py:1237 msgid "Path" -msgstr "" +msgstr "Camín" #: ../src/msec/msecgui.py:1243 msgid "User" @@ -983,9 +837,10 @@ msgstr "" #: ../src/msec/msecgui.py:1458 msgid "Exception: " -msgstr "" +msgstr "Esceición: " #: ../src/msec/msecgui.py:1494 +#, python-format msgid "Changing permissions for %s" msgstr "" @@ -994,6 +849,7 @@ msgid "Adding new permission check" msgstr "" #: ../src/msec/msecgui.py:1514 +#, python-format msgid "Changing permissions on <b>%s</b>" msgstr "" @@ -1036,10 +892,12 @@ msgid "ACL: " msgstr "ACL: " #: ../src/msec/msecgui.py:1647 +#, python-format msgid "Select new value for %s" msgstr "" #: ../src/msec/msecgui.py:1656 +#, python-format msgid "" "<i>%s</i>\n" "\n" @@ -1051,6 +909,236 @@ msgstr "" msgid "New value:" msgstr "" +#: ../src/msec/libmsec.py:265 +#, python-format +msgid "%s modified so launched command: %s" +msgstr "" + +#: ../src/msec/libmsec.py:274 +#, python-format +msgid "%s modified so should have run command: %s" +msgstr "" + +#: ../src/msec/libmsec.py:376 ../src/msec/libmsec.py:408 +#, python-format +msgid "deleted %s" +msgstr "" + +#: ../src/msec/libmsec.py:394 +#, python-format +msgid "touched file %s" +msgstr "" + +#: ../src/msec/libmsec.py:414 +#, python-format +msgid "made symbolic link from %s to %s" +msgstr "" + +#: ../src/msec/libmsec.py:417 +#, python-format +msgid "moved file %s to %s" +msgstr "" + +#: ../src/msec/libmsec.py:467 ../src/msec/libmsec.py:483 +#, python-format +msgid "set variable %s to %s in %s" +msgstr "" + +#: ../src/msec/libmsec.py:685 +#, python-format +msgid "Error loading plugin '%s' from %s: %s" +msgstr "" + +#: ../src/msec/libmsec.py:702 +#, python-format +msgid "Invalid callback: %s" +msgstr "" + +#: ../src/msec/libmsec.py:711 +#, python-format +msgid "Plugin %s not found" +msgstr "" + +#: ../src/msec/libmsec.py:718 +#, python-format +msgid "Not supported function '%s' in '%s'" +msgstr "" + +#: ../src/msec/libmsec.py:725 ../src/msec/libmsec.py:855 +msgid "In check-only mode, nothing is written back to disk." +msgstr "" + +#: ../src/msec/libmsec.py:752 +#, python-format +msgid "Invalid parameter for %s: '%s'. Valid parameters: '%s'." +msgstr "" + +#: ../src/msec/libmsec.py:785 +#, python-format +msgid "user name %s not found" +msgstr "" + +#: ../src/msec/libmsec.py:797 +#, python-format +msgid "user name not found for id %d" +msgstr "" + +#: ../src/msec/libmsec.py:809 +#, python-format +msgid "group name %s not found" +msgstr "" + +#: ../src/msec/libmsec.py:821 +#, python-format +msgid "group name not found for id %d" +msgstr "" + +#: ../src/msec/libmsec.py:831 +msgid "Unable to check /proc/mounts. Assuming all file systems are local." +msgstr "" + +#: ../src/msec/libmsec.py:870 +#, python-format +msgid "Forcing ownership of %s to %s" +msgstr "" + +#: ../src/msec/libmsec.py:874 +#, python-format +msgid "Error changing user on %s: %s" +msgstr "" + +#: ../src/msec/libmsec.py:876 +#, python-format +msgid "Wrong owner of %s: should be %s" +msgstr "" + +#: ../src/msec/libmsec.py:879 +#, python-format +msgid "Enforcing group on %s to %s" +msgstr "" + +#: ../src/msec/libmsec.py:883 +#, python-format +msgid "Error changing group on %s: %s" +msgstr "" + +#: ../src/msec/libmsec.py:885 +#, python-format +msgid "Wrong group of %s: should be %s" +msgstr "" + +#: ../src/msec/libmsec.py:890 +#, python-format +msgid "Enforcing permissions on %s to %o" +msgstr "" + +#: ../src/msec/libmsec.py:894 +#, python-format +msgid "Error changing permissions on %s: %s" +msgstr "" + +#: ../src/msec/libmsec.py:896 +#, python-format +msgid "Wrong permissions of %s: should be %o" +msgstr "" + +#: ../src/msec/libmsec.py:900 +#, python-format +msgid "Enforcing acl on %s" +msgstr "" + +#: ../src/msec/libmsec.py:914 +#, python-format +msgid "Unable to add filesystem-specific ACL %s to %s" +msgstr "" + +#: ../src/msec/libmsec.py:916 +#, python-format +msgid "Error changing acl on %s: %s" +msgstr "" + +#: ../src/msec/libmsec.py:918 +#, python-format +msgid "Wrong acl of %s" +msgstr "" + +#: ../src/msec/libmsec.py:935 +#, python-format +msgid "bad permissions for '%s': '%s'" +msgstr "" + +#: ../src/msec/libmsec.py:960 +#, python-format +msgid "Non local file: \"%s\". Nothing changed." +msgstr "" + +#: ../src/msec/libmsec.py:1005 +#, python-format +msgid "Checking paths: %s" +msgstr "" + +#: ../src/msec/tools.py:33 +#, python-format +msgid "Unable to parse firewall configuration: %s" +msgstr "" + +#: ../src/msec/tools.py:36 ../src/msec/config.py:60 +msgid "Disabled" +msgstr "" + +#: ../src/msec/tools.py:38 +#, python-format +msgid "Enabled, with %d rules" +msgstr "" + +#: ../src/msec/tools.py:48 +#, python-format +msgid "Last updated: %s" +msgstr "" + +#: ../src/msec/tools.py:50 +#, python-format +msgid "Unable to access %s: %s" +msgstr "" + +#: ../src/msec/tools.py:51 +msgid "Unable to determine update status" +msgstr "" + +#: ../src/msec/config.py:46 +msgid "Modified system files" +msgstr "" + +#: ../src/msec/config.py:47 +msgid "No changes in system files" +msgstr "" + +#: ../src/msec/config.py:222 ../src/msec/config.py:436 +#, python-format +msgid "Unable to load configuration file %s: %s" +msgstr "" + +#: ../src/msec/config.py:236 ../src/msec/config.py:346 +#: ../src/msec/config.py:455 +#, python-format +msgid "Bad config option: %s" +msgstr "" + +#: ../src/msec/config.py:271 ../src/msec/config.py:385 +#: ../src/msec/config.py:481 +#, python-format +msgid "Unable to save %s: %s" +msgstr "" + +#: ../src/msec/config.py:331 +#, python-format +msgid "loading exceptions file %s: %s" +msgstr "" + +#: ../src/msec/config.py:332 +msgid "No exceptions loaded" +msgstr "" + #: ../src/msec/plugins/audit.py:207 msgid "Activating periodic promiscuity check" msgstr "" @@ -1067,12 +1155,80 @@ msgstr "" msgid "Disabling daily security check" msgstr "" -#: ../src/msec/plugins/log.py:45 -msgid "Invalid retention period: \"%s\"" +#: ../src/msec/plugins/pam.py:68 +msgid "Using password to authenticate users" msgstr "" -#: ../src/msec/plugins/log.py:53 -msgid "Setting log retention period to %d weeks" +#: ../src/msec/plugins/pam.py:72 +msgid "Don't use password to authenticate users" +msgstr "" + +#: ../src/msec/plugins/pam.py:83 +msgid "Password history not supported with pam_tcb." +msgstr "" + +#: ../src/msec/plugins/pam.py:91 +#, python-format +msgid "Invalid maximum password history length: \"%s\"" +msgstr "" + +#: ../src/msec/plugins/pam.py:106 +#, python-format +msgid "Setting password history to %d." +msgstr "" + +#: ../src/msec/plugins/pam.py:112 +msgid "Disabling password history" +msgstr "" + +#: ../src/msec/plugins/pam.py:124 +#, python-format +msgid "" +"Invalid password length \"%s\". Use \"length,ndigits,nupper\" as parameter" +msgstr "" + +#: ../src/msec/plugins/pam.py:145 +#, python-format +msgid "Setting minimum password length %d" +msgstr "" + +#: ../src/msec/plugins/pam.py:169 +msgid "Allowing su only from wheel group members" +msgstr "" + +#: ../src/msec/plugins/pam.py:173 +msgid "no wheel group" +msgstr "" + +#: ../src/msec/plugins/pam.py:177 +msgid "" +"Security configuration is defined to allow only members of the wheel group " +"to su to root, but this group is empty. Please add the allowed users into " +"the wheel group." +msgstr "" + +#: ../src/msec/plugins/pam.py:185 +msgid "Allowing su for all" +msgstr "" + +#: ../src/msec/plugins/pam.py:204 +msgid "Allowing transparent root access for wheel group members" +msgstr "" + +#: ../src/msec/plugins/pam.py:211 +msgid "Disabling transparent root access for wheel group members" +msgstr "" + +#: ../src/msec/plugins/network.py:131 +msgid "Allowing remote root login" +msgstr "" + +#: ../src/msec/plugins/network.py:135 +msgid "Forbidding remote root login" +msgstr "" + +#: ../src/msec/plugins/network.py:139 +msgid "Allowing remote root login only by passphrase" msgstr "" #: ../src/msec/plugins/msec.py:149 @@ -1080,14 +1236,17 @@ msgid "Allowing unrestricted chkconfig for packages" msgstr "" #: ../src/msec/plugins/msec.py:154 +#, python-format msgid "Restricting chkconfig for packages according to \"%s\" profile" msgstr "" #: ../src/msec/plugins/msec.py:164 +#, python-format msgid "Setting root umask to %s" msgstr "" #: ../src/msec/plugins/msec.py:174 +#, python-format msgid "Setting users umask to %s" msgstr "" @@ -1104,6 +1263,7 @@ msgid "Restricting X server connection to the console user" msgstr "" #: ../src/msec/plugins/msec.py:204 +#, python-format msgid "invalid allow_x_connections arg: %s" msgstr "" @@ -1116,18 +1276,22 @@ msgid "Forbidding the X server to listen to tcp connection" msgstr "" #: ../src/msec/plugins/msec.py:257 +#, python-format msgid "Invalid shell timeout \"%s\"" msgstr "" #: ../src/msec/plugins/msec.py:265 +#, python-format msgid "Setting shell timeout to %s" msgstr "" #: ../src/msec/plugins/msec.py:273 +#, python-format msgid "Invalid shell history size \"%s\"" msgstr "" #: ../src/msec/plugins/msec.py:284 +#, python-format msgid "Setting shell history size to %s" msgstr "" @@ -1136,6 +1300,7 @@ msgid "Removing limit on shell history size" msgstr "" #: ../src/msec/plugins/msec.py:297 +#, python-format msgid "Invalid file system umask \"%s\"" msgstr "" @@ -1267,108 +1432,315 @@ msgstr "" msgid "Not allowing including current directory in path" msgstr "" -#: ../src/msec/plugins/network.py:131 -msgid "Allowing remote root login" +#: ../src/msec/plugins/sudo.py:49 +msgid "Allowing users in wheel group to use sudo" msgstr "" -#: ../src/msec/plugins/network.py:135 -msgid "Forbidding remote root login" +#: ../src/msec/plugins/sudo.py:54 +msgid "Allowing users in wheel group to use sudo without password" msgstr "" -#: ../src/msec/plugins/network.py:139 -msgid "Allowing remote root login only by passphrase" +#: ../src/msec/plugins/sudo.py:57 +msgid "Not allowing users in wheel group to use sudo" msgstr "" -#: ../src/msec/plugins/pam.py:68 -msgid "Using password to authenticate users" +#: ../src/msec/plugins/log.py:45 +#, python-format +msgid "Invalid retention period: \"%s\"" msgstr "" -#: ../src/msec/plugins/pam.py:72 -msgid "Don't use password to authenticate users" +#: ../src/msec/plugins/log.py:53 +#, python-format +msgid "Setting log retention period to %d weeks" msgstr "" -#: ../src/msec/plugins/pam.py:83 -msgid "Password history not supported with pam_tcb." +#: ../src/msec/man.py:234 +msgid "NAME" +msgstr "NOME" + +#: ../src/msec/man.py:235 +msgid "SYNOPSIS" +msgstr "SINOPSIS" + +#: ../src/msec/man.py:236 +msgid "DESCRIPTION" +msgstr "DESCRIPCIÓN" + +#: ../src/msec/man.py:237 +msgid "options" msgstr "" -#: ../src/msec/plugins/pam.py:91 -msgid "Invalid maximum password history length: \"%s\"" +#: ../src/msec/man.py:238 +msgid "Mageia Linux security tools" msgstr "" -#: ../src/msec/plugins/pam.py:106 -msgid "Setting password history to %d." +#: ../src/msec/man.py:239 +msgid "" +"msec\n" +"is responsible to maintain system security in Mageia. It supports different " +"security\n" +"configurations, which can be organized into several security levels, stored " +"in\n" +"/etc/security/msec/level.LEVELNAME. Currently, three basic preconfigured " +"security levels are\n" +"provided with Mageia Linux:" msgstr "" -#: ../src/msec/plugins/pam.py:112 -msgid "Disabling password history" +#: ../src/msec/man.py:245 +msgid "" +"this level disables all msec options. It should be used when you want to " +"manage\n" +"all aspects of system security on your own." msgstr "" -#: ../src/msec/plugins/pam.py:124 +#: ../src/msec/man.py:247 msgid "" -"Invalid password length \"%s\". Use \"length,ndigits,nupper\" as parameter" +"this is the default security level, which configures a reasonably safe set " +"of security\n" +"features. It activates several periodic system checks, and sends the results " +"of their\n" +"execution by email (by default, the local 'root' account is used)." msgstr "" -#: ../src/msec/plugins/pam.py:145 -msgid "Setting minimum password length %d" +#: ../src/msec/man.py:255 +msgid "" +"Besides those levels, different task-oriented security are also provided,\n" +"such as the 'fileserver', 'webserver' and 'netbook' levels. Such levels\n" +"attempt to pre-configure system security according to the most common use\n" +"cases." msgstr "" -#: ../src/msec/plugins/pam.py:169 -msgid "Allowing su only from wheel group members" +#: ../src/msec/man.py:259 +msgid "" +"Note that besides those levels you may create as many levels as necessary." msgstr "" -#: ../src/msec/plugins/pam.py:173 -msgid "no wheel group" +#: ../src/msec/man.py:260 +msgid "" +"The security settings are stored in \\fB/etc/security/msec/security.conf" +"\\fR\n" +"file, and default settings for each predefined level are stored in\n" +"\\fB/etc/security/msec/level.LEVEL\\fR. Permissions for files and " +"directories\n" +"that should be enforced or checked for changes are stored in\n" +"\\fB/etc/security/msec/perms.conf\\fR, and default permissions for each\n" +"predefined level are stored in \\fB/etc/security/msec/perm.LEVEL\\fR. Note\n" +"that user-modified parameters take precedence over default level settings. " +"For\n" +"example, when default level configuration forbids direct root logins, this\n" +"setting can be overridden by the user." msgstr "" -#: ../src/msec/plugins/pam.py:177 +#: ../src/msec/man.py:269 +msgid "The following options are supported by msec applications:" +msgstr "" + +#: ../src/msec/man.py:271 msgid "" -"Security configuration is defined to allow only members of the wheel group " -"to su to root, but this group is empty. Please add the allowed users into " -"the wheel group." +"This is the console version of msec. It is responsible for system security " +"configuration\n" +"and checking and transitions between security levels.\n" +"\n" +"When executed without parameters, msec will read the system configuration " +"file\n" +"(/etc/security/msec/security.conf), and enforce the specified security\n" +"settings. The operations are logged to \\fB/var/log/msec.log\\fP file, and " +"also\n" +"to syslog, using \\fBLOG_AUTHPRIV\\fR facility. Please note that msec " +"should\n" +"by run as root." msgstr "" -#: ../src/msec/plugins/pam.py:185 -msgid "Allowing su for all" +#: ../src/msec/man.py:279 ../src/msec/man.py:298 +msgid "This option will display the list of supported command line options." msgstr "" -#: ../src/msec/plugins/pam.py:204 -msgid "Allowing transparent root access for wheel group members" +#: ../src/msec/man.py:280 ../src/msec/man.py:299 +msgid "List the default configuration for given security level." msgstr "" -#: ../src/msec/plugins/pam.py:211 -msgid "Disabling transparent root access for wheel group members" +#: ../src/msec/man.py:281 +msgid "" +"Apply the specified security level to the system, overwriting all local\n" +"changes in /etc/security/msec/security.conf. This usually should be " +"performed\n" +"either on first install, or when a transition to a different level is " +"required." msgstr "" -#: ../src/msec/plugins/sudo.py:49 -msgid "Allowing users in wheel group to use sudo" +#: ../src/msec/man.py:284 +msgid "Enable debugging messages." msgstr "" -#: ../src/msec/plugins/sudo.py:54 -msgid "Allowing users in wheel group to use sudo without password" +#: ../src/msec/man.py:285 +msgid "" +"Verify the actions that will be performed by msec, without actually\n" +"doing anything to the system. In this mode of operation, msec performs all " +"the\n" +"required tasks, except effectively writting data back to disk." msgstr "" -#: ../src/msec/plugins/sudo.py:57 -msgid "Not allowing users in wheel group to use sudo" +#: ../src/msec/man.py:288 +msgid "Use path as root. Can be used to perform msec actions in chroot." msgstr "" -#: ../src/msec/tools.py:33 -msgid "Unable to parse firewall configuration: %s" +#: ../src/msec/man.py:289 +msgid "Run quietly" msgstr "" -#: ../src/msec/tools.py:38 -msgid "Enabled, with %d rules" +#: ../src/msec/man.py:290 +msgid "Save current settings as a new security level." msgstr "" -#: ../src/msec/tools.py:48 -msgid "Last updated: %s" +#: ../src/msec/man.py:291 +msgid "" +"This application is responsible for system permission checking and " +"enforcements.\n" +"\n" +"When executed without parameters, msecperms will read the permissions\n" +"configuration file (/etc/security/msec/perms.conf), and enforce the " +"specified\n" +"security settings. The operations are logged to \\fB/var/log/msec.log\\fP " +"file,\n" +"and also to syslog, using \\fBLOG_AUTHPRIV\\fR facility. Please note that " +"msecperms\n" +"should by run as root." msgstr "" -#: ../src/msec/tools.py:50 -msgid "Unable to access %s: %s" +#: ../src/msec/man.py:300 +msgid "Enforce the default permissions on all files." msgstr "" -#: ../src/msec/tools.py:51 -msgid "Unable to determine update status" +#: ../src/msec/man.py:301 +msgid "" +"This is the GTK version of msec. It acts as frontend to all msec " +"functionalities." +msgstr "" + +#: ../src/msec/man.py:302 +msgid "EXAMPLES" +msgstr "" + +#: ../src/msec/man.py:303 +msgid "" +"Enforce system configuration according to /etc/security/msec/security.conf " +"file:" +msgstr "" + +#: ../src/msec/man.py:304 +msgid "Display system configuration changes without enforcing anything:" +msgstr "" + +#: ../src/msec/man.py:305 +msgid "Install predefined security level 'standard':" +msgstr "" + +#: ../src/msec/man.py:306 ../src/msec/man.py:313 +msgid "Preview changes inflicted by change to 'standard' level:" +msgstr "" + +#: ../src/msec/man.py:307 +msgid "Create a custom security level based on 'standard':" +msgstr "" + +#: ../src/msec/man.py:308 ../src/msec/man.py:315 +msgid "" +"Export current security settings to create a new security level named " +"'office':" +msgstr "" + +#: ../src/msec/man.py:309 +msgid "DEFINING EXCEPTIONS FOR PERIODIC CHECKS" +msgstr "" + +#: ../src/msec/man.py:310 +msgid "" +"Enforce system permissions according to /etc/security/msec/perms.conf file:" +msgstr "" + +#: ../src/msec/man.py:311 +msgid "Display permissions changes without enforcing anything:" +msgstr "" + +#: ../src/msec/man.py:312 +msgid "Install predefined permissions for level 'standard':" +msgstr "" + +#: ../src/msec/man.py:314 +msgid "Create a custom permissions level based on 'secure':" +msgstr "" + +#: ../src/msec/man.py:316 +msgid "" +"msec\n" +"is capable of excluding certain patterns from periodic check reports. For\n" +"this, it is possible to define the exceptions in\n" +"\\fB/etc/security/msec/exceptions\\fP file, for each supported check." +msgstr "" + +#: ../src/msec/man.py:320 +msgid "" +"For example, to exclude all items that match \\fB/mnt\\fP, Mageia-based\n" +"chrooted installations in \\fB/chroot\\fP and all backup files from the\n" +"results of the check for unowned files on the system, it is sufficient to\n" +"define the following entry in the exceptions file:" +msgstr "" + +#: ../src/msec/man.py:324 +msgid "" +"In a similar way, it is possible to exclude the results for the \\fBdeluge" +"\\fP application from the list of open ports as follows:" +msgstr "" + +#: ../src/msec/man.py:325 +msgid "" +"Each exception entry is a regular exception, and you might define as many " +"exceptions as necessary." +msgstr "" + +#: ../src/msec/man.py:326 +msgid "" +"In order to exclude a path from all msec checks, you may use * for the check " +"name. For example, the following would exclude /media/ from all msec checks:" +msgstr "" + +#: ../src/msec/man.py:327 +msgid "See below for all msec options that support this feature." +msgstr "" + +#: ../src/msec/man.py:328 +msgid "SECURITY OPTIONS" +msgstr "" + +#: ../src/msec/man.py:329 +msgid "The following security options are supported by msec:" +msgstr "" + +#: ../src/msec/man.py:340 +msgid "NOTES" +msgstr "" + +#: ../src/msec/man.py:341 +msgid "Msec applications must be run by root." +msgstr "" + +#: ../src/msec/man.py:342 +msgid "AUTHORS" +msgstr "" + +#: ../src/msec/man.py:381 +msgid "MSEC parameter:" +msgstr "" + +#: ../src/msec/man.py:381 +msgid "Accepted values:" +msgstr "" + +#: ../src/msec/man.py:384 +#, python-format +msgid "" +"(This check supports exceptions via %s variable defined in \\fB/etc/security/" +"msec/exceptions\\fP file)" msgstr "" # File: ../cron-sh/security.sh, line: 15 |