Browsing Uyghur translation

110 of 392 results
1.
translator-credits
Context:
_
Put one translator per line, in the form NAME <EMAIL>, YEAR1, YEAR2
To prevent privacy issues, this translation is not available to anonymous users,
if you want to see it, please, log in first.
2.
Jim Campbell
(itstool) path: credit/name
(no translation yet)
Located in C/about-diff-private-public.page:14 C/about-ssh.page:13 C/concepts.page:14 C/index.page:13 C/introduction.page:15 C/keyring-create.page:26 C/keyring.page:15 C/pgp-create.page:16 C/pgp-import.page:21 C/ssh-connect-remote.page:14 C/ssh-create.page:16 C/ssh-import.page:20
3.
2013
(itstool) path: credit/years
(no translation yet)
Located in C/about-diff-private-public.page:16 C/about-pgp.page:17 C/about-ssh.page:15 C/glossary.page:17 C/index.page:15 C/index.page:20 C/index.page:25 C/introduction.page:17 C/introduction.page:23 C/key-servers-add.page:18 C/keyring-change-default.page:16 C/keyring-create.page:18 C/keyring-create.page:23 C/keyring-lock.page:17 C/keyring-unlock.page:17 C/keyring-update-password.page:17 C/keyring.page:17 C/keyring.page:22 C/keyring.page:27 C/misc-key-backup.page:17 C/misc-key-fingerprint.page:16 C/passwords-stored-create.page:16 C/passwords-view.page:17 C/pgp-create.page:18 C/pgp-create.page:24 C/pgp-delete.page:17 C/pgp-expiration-change.page:16 C/pgp-expired.page:17 C/pgp-export.page:16 C/pgp-import.page:18 C/pgp-import.page:23 C/pgp-photoid.page:17 C/pgp-publish.page:17 C/pgp-retrieve-remote.page:17 C/pgp-sign.page:16 C/pgp-subkeys.page:16 C/pgp-sync.page:17 C/pgp-userid-add.page:17 C/pgp-userid-primary.page:16 C/pgp-userid-remove.page:17 C/pgp-userid.page:16 C/ssh-create.page:18 C/ssh-export.page:17 C/ssh-import.page:17 C/ssh-import.page:22 C/subkeys-add.page:17 C/subkeys-examine.page:17 C/subkeys-revoke.page:17
4.
A public key is used to encrypt communication. A private key is used to decrypt it.
(itstool) path: info/desc
(no translation yet)
Located in C/about-diff-private-public.page:19
5.
Public Key vs Private Key
(itstool) path: page/title
(no translation yet)
Located in C/about-diff-private-public.page:23
6.
Although <em>Public Keys</em> and <em>Private Keys</em> are both referred to as <em>keys</em>, it helps to think of them a bit differently. Try to think of a <em>Public Key</em> as being like a padlock, and a <em>Private Key</em> as being like a key that unlocks the padlock.
(itstool) path: page/p
(no translation yet)
Located in C/about-diff-private-public.page:25
7.
An Example: Sending a Secret Message in a Box
(itstool) path: section/title
(no translation yet)
Located in C/about-diff-private-public.page:31
8.
Let's use an example to see how this works. Imagine that you want your friend to send you a secret message in a box. You could give your friend a box and a padlock, but only you would have the key that unlocks the padlock.
(itstool) path: section/p
(no translation yet)
Located in C/about-diff-private-public.page:33
9.
Your friend could put their message in the box, lock the padlock, and then send you the locked box in the mail. When you receive it, you would use your key to unlock the box.
(itstool) path: section/p
(no translation yet)
Located in C/about-diff-private-public.page:38
10.
This is similar to how a <em>Public Key</em> and a <em>Private Key</em> work. Like the padlock, you can freely give out your <em>Public Key</em>. This will make it easy for anyone to securely encrypt, or lock, a message that they want to send to you.
(itstool) path: section/p
(no translation yet)
Located in C/about-diff-private-public.page:42
110 of 392 results

This translation is managed by translation group gnome-translation-project.

You are not logged in. Please log in to work on translations.

No-one has contributed to this translation yet.