Re: [RFR] po-debconf://haserl/pt_BR.pot
Olá amigos,
Segue arquivo para revisão.
Grato desde já.
# Debconf translations for haserl.
# Copyright (C) 2017 THE haserl'S COPYRIGHT HOLDER
# This file is distributed under the same license as the haserl package.
# Raimundo Corrêa <rcsjunior1976@gmail.com>, 2017.
#
msgid ""
msgstr ""
"Project-Id-Version: haserl 0.9.35\n"
"Report-Msgid-Bugs-To: haserl@packages.debian.org\n"
"POT-Creation-Date: 2011-08-04 09:25+0200\n"
"PO-Revision-Date: 2017-11-30 18:30-0200\n"
"Last-Translator: Raimundo Corrêa <rcsjunior1976@gmail.com>\n"
"Language-Team: Brazilian Portuguese <debian-l10n-portuguese@lists.debian.org>\n"
"Language: pt_BR\n"
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
#. Type: boolean
#. Description
#: ../haserl.templates:2001
msgid "Install haserl binary with suid root permissions?"
msgstr ""
"Instalar binário do haserl com permissões suid de superusuário?"
#. Type: boolean
#. Description
#: ../haserl.templates:2001
msgid ""
"When haserl is installed with suid root permissions, it will automatically "
"set its UID and GID to match the owner and group of the script."
msgstr ""
"Quando o haserl for instalado com permissões suid de superusuário, ele "
"configurará automaticamente seu UID e GID para que corresponda ao "
"dono e grupo do script."
#. Type: boolean
#. Description
#: ../haserl.templates:2001
msgid ""
"This is a potential security vulnerability, as scripts that are owned by "
"root will be run as root, even when they do not have the suid root bit."
msgstr ""
"Isto é uma vulnerabilidade de segurança em potencial, pois scripts "
"que pertencem ao superusuário serão executados como superusuário, "
"mesmo quando eles não tiverem o bit de superusuário."
Reply to: