[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#333482: cgiemail: [INTL:sv] Swedish debconf templates translation



Package: cgiemail
Version: 1.6-28
Severity: wishlist
Tags: patch l10n



-- System Information:
Debian Release: testing/unstable
  APT prefers unstable
  APT policy: (500, 'unstable'), (500, 'stable')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.13.2
Locale: LANG=sv_SE, LC_CTYPE=sv_SE (charmap=ISO-8859-1)
# Translators, if you are not familiar with the PO format, gettext
# documentation is worth reading, especially sections dedicated to
# this format, e.g. by running:
# info -n '(gettext)PO Files'
# info -n '(gettext)Header Entry'
# Some information specific to po-debconf are available at
# /usr/share/doc/po-debconf/README-trans
# or http://www.debian.org/intl/l10n/po-debconf/README-trans
# Developers do not need to manually edit POT or PO files.
# , fuzzy
# 
# 
msgid ""
msgstr ""
"Project-Id-Version: cgiemail 1.6-28\n"
"Report-Msgid-Bugs-To: \n"
"POT-Creation-Date: 2003-08-10 10:27+0200\n"
"PO-Revision-Date: 2005-10-13 08:27+0200\n"
"Last-Translator: Daniel Nylander <po@danielnylander.se>\n"
"Language-Team: Swedish <sv@li.org>\n"
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=iso-8859-1\n"
"Content-Transfer-Encoding: 8bit"

#. Description
#: ../templates:4
msgid "Where do you want to put cgiemail's mail templates?"
msgstr "Var vill du lägga cgiemail-s e-postmallar?"

#. Description
#: ../templates:4
msgid ""
"In old versions of cgiemail, templates that were used for creating e-mails "
"to be sent could be placed anywhere that would be served up by the web "
"server.  This behaviour is a security vulnerability: an attacker can read "
"files that he shouldn't be able to, such as scripts in cgi-bin, if they "
"contain certain pieces of text."
msgstr ""
"I äldre versioner av cgiemail användes mallar för att skapa e-post som skulle "
"skickas och de kunde placeras var som helst i webservern.  Detta är en säkerhetsrisk "
"eftersom en attackare kan läsa filerna som han inte borde göra, såsom skript i cgi-bin "
"om du innehåller viss typ av text."

#. Description
#: ../templates:4
msgid ""
"If you enter nothing (that is, erase the default directory, leaving this "
"empty), cgiemail will still work. This may be needed if you are, for "
"instance, hosting web services, and cannot move all of your clients cgiemail "
"templates to one directory.  Remember that this will LEAVE THE SECURITY HOLE "
"OPEN, and is only a choice for backwards compatibility."
msgstr ""
"Om du inte anger något (alltså, rensa standardmappen, lämna denna blank) kommer "
"cgiemail fortfarande att fungera. Detta kan vara nödvändigt om du till exempel "
"erbjuder webtjänster och inte kan flytta alla dina klienters cgiemail-mallar till en mapp.  "
"Tänk på att detta är ETT ÖPPET SÄKERHETSHÅL och är bara ett val för att "
"vara bakåtkompatibel."

#. Description
#: ../templates:4
msgid ""
"To close the hole, enter a directory, which MUST be accessible by your web "
"server.  Template files that you want to use should go there. For further "
"instructions, please read the README.Debian and README files in /usr/share/"
"doc/cgiemail/."
msgstr ""
"För att stänga detta hål, ange en mapp som din webserver MÅSTE ha tillgång till.  "
"Mallfilerna som du vill använda ska ligger där. För mer instruktioner, läs README.Debian "
"och README-filerna i /usr/share/doc/cgiemail/."


Reply to: