Translations by Nick Ellery

Nick Ellery has submitted the following strings to this translation. Contributions are visually coded: currently used translations, unreviewed suggestions, rejected suggestions.

150 of 77 results
1.
ubuntu-doc@lists.ubuntu.com (Ubuntu Documentation Project)
2008-05-20
ubuntu-doc@lists.ubuntu.com (Ubuntu Documentation Project)
2.
Keeping Your Computer Safe
2008-05-20
Keeping Your Computer Safe
3.
2006-09-07
2008-05-20
2006-09-07
4.
Placeholder.
2008-05-20
Placeholder.
5.
Credits and License
2008-05-20
Credits and License
6.
This document is maintained by the Ubuntu documentation team (https://wiki.ubuntu.com/DocumentationTeam). For a list of contributors, see the <ulink url="../../../common/C/contributors.xml">contributors page</ulink>
2008-05-20
This document is maintained by the Ubuntu documentation team (https://wiki.ubuntu.com/DocumentationTeam). For a list of contributors, see the <ulink url="../../../common/C/contributors.xml">contributors page</ulink>
7.
This document is made available under the Creative Commons ShareAlike 2.5 License (CC-BY-SA).
2008-05-20
This document is made available under the Creative Commons ShareAlike 2.5 License (CC-BY-SA).
8.
You are free to modify, extend, and improve the Ubuntu documentation source code under the terms of this license. All derivative works must be released under this license.
2008-05-20
You are free to modify, extend, and improve the Ubuntu documentation source code under the terms of this license. All derivative works must be released under this license.
9.
This documentation is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE AS DESCRIBED IN THE DISCLAIMER.
2008-05-20
This documentation is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE AS DESCRIBED IN THE DISCLAIMER.
10.
A copy of the license is available here: <ulink url="/usr/share/ubuntu-docs/common/C/ccbysa.xml">Creative Commons ShareAlike License</ulink>.
2008-05-20
A copy of the license is available here: <ulink url="/usr/share/ubuntu-docs/common/C/ccbysa.xml">Creative Commons ShareAlike License</ulink>.
11.
2004, 2005, 2006
2008-05-20
2004, 2005, 2006
12.
Ubuntu Documentation Project
2008-05-20
Ubuntu Documentation Project
13.
Canonical Ltd. and members of the <placeholder-1/>
2008-05-20
Canonical Ltd. and members of the <placeholder-1/>
14.
The Ubuntu Documentation Project
2008-05-20
The Ubuntu Documentation Project
15.
This section describes how to keep your computer safe from security threats.
2008-05-20
This section describes how to keep your computer safe from security threats.
16.
Give a separate user account to each person
2008-05-20
Give a separate user account to each person
17.
When Ubuntu is installed, it is set up for a single person to use. If more than one person will use the computer, it is best for each person to have their own user account. This way they can have separate settings, documents, and other files. If necessary, files can also be protected from being viewed or changed by non-administrators.
2008-05-20
When Ubuntu is installed, it is set up for a single person to use. If more than one person will use the computer, it is best for each person to have their own user account. This way they can have separate settings, documents, and other files. If necessary, files can also be protected from being viewed or changed by non-administrators.
18.
To set up user accounts, choose <menuchoice><guimenu>System</guimenu><guimenuitem>Administration</guimenuitem><guimenuitem>Users and Groups</guimenuitem></menuchoice>. You must be an <ulink type="help" url="ghelp:administrative">administrator</ulink> to do this.
2008-05-20
To set up user accounts, choose <menuchoice><guimenu>System</guimenu><guimenuitem>Administration</guimenuitem><guimenuitem>Users and Groups</guimenuitem></menuchoice>. You must be an <ulink type="help" url="ghelp:administrative">administrator</ulink> to do this.
19.
See the <ulink type="help" url="ghelp:users-admin">Users Administration Tool manual</ulink> for more information on setting up user accounts.
2008-05-20
See the <ulink type="help" url="ghelp:users-admin">Users Administration Tool manual</ulink> for more information on setting up user accounts.
20.
Keep your software up to date
2008-05-20
Keep your software up to date
21.
Ubuntu developers often issue updates to the Ubuntu software. These updates may improve security or fix other problems.
2008-05-20
Ubuntu developers often issue updates to the Ubuntu software. These updates may improve security or fix other problems.
22.
When updates are available, the update icon (an orange star) appears in the panel, usually near the top right of the screen. To install updates you must be an <ulink type="help" url="ghelp:administrative">administrator</ulink> and the computer must be connected to the Internet.
2008-05-20
When updates are available, the update icon (an orange star) appears in the panel, usually near the top right of the screen. To install updates you must be an <ulink type="help" url="ghelp:administrative">administrator</ulink> and the computer must be connected to the Internet.
23.
Click the update icon, and enter your password when asked.
2008-05-20
Click the update icon, and enter your password when asked.
24.
In the Update Manager window, click <guibutton>Install Updates</guibutton>.
2008-05-20
In the Update Manager window, click <guibutton>Install Updates</guibutton>.
25.
The update process may take a while if many updates need to be installed.
2008-05-20
The update process may take a while if many updates need to be installed.
26.
If a pair of blue arrows appears in the panel when the updates have finished, you need to restart the computer to complete the installation.
2008-05-20
If a pair of blue arrows appears in the panel when the updates have finished, you need to restart the computer to complete the installation.
27.
To check for updates yourself, choose <menuchoice><guimenu>System</guimenu><guimenuitem>Administration</guimenuitem><guimenuitem>Update Manager</guimenuitem></menuchoice> and press <guibutton>Check</guibutton>.
2008-05-20
To check for updates yourself, choose <menuchoice><guimenu>System</guimenu><guimenuitem>Administration</guimenuitem><guimenuitem>Update Manager</guimenuitem></menuchoice> and press <guibutton>Check</guibutton>.
28.
To change how often Ubuntu checks for updates, or to set updates to install or download automatically, choose <menuchoice><guimenu>System</guimenu><guimenuitem>Administration</guimenuitem><guimenuitem>Software Sources</guimenuitem></menuchoice>, and then <guilabel>Internet Updates</guilabel>.
2008-05-20
To change how often Ubuntu checks for updates, or to set updates to install or download automatically, choose <menuchoice><guimenu>System</guimenu><guimenuitem>Administration</guimenuitem><guimenuitem>Software Sources</guimenuitem></menuchoice>, and then <guilabel>Internet Updates</guilabel>.
29.
Lock your screen while away
2008-05-20
Lock your screen while away
30.
Locking your screen prevents other people from accessing your computer while you are away from it. All of your applications and work remain open while the screen is locked, and the screensaver is displayed.
2008-05-20
Locking your screen prevents other people from accessing your computer while you are away from it. All of your applications and work remain open while the screen is locked, and the screensaver is displayed.
31.
You can lock your screen in one of the following ways:
2008-05-20
You can lock your screen in one of the following ways:
32.
Press <menuchoice><guimenu>System</guimenu><guimenuitem>Quit...</guimenuitem><guimenuitem>Lock Screen</guimenuitem></menuchoice>.
2008-05-20
Press <menuchoice><guimenu>System</guimenu><guimenuitem>Quit...</guimenuitem><guimenuitem>Lock Screen</guimenuitem></menuchoice>.
33.
Press <keycombo><keycap>Control</keycap><keycap>Alt</keycap><keycap>L</keycap></keycombo> to lock the screen. This keyboard shortcut can be changed in <menuchoice><guimenu>System</guimenu><guimenuitem>Preferences</guimenuitem><guimenuitem>Keyboard Shortcuts</guimenuitem></menuchoice>.
2008-05-20
Press <keycombo><keycap>Control</keycap><keycap>Alt</keycap><keycap>L</keycap></keycombo> to lock the screen. This keyboard shortcut can be changed in <menuchoice><guimenu>System</guimenu><guimenuitem>Preferences</guimenuitem><guimenuitem>Keyboard Shortcuts</guimenuitem></menuchoice>.
34.
You can add a <guibutton>Lock Screen</guibutton> button to a panel for easy access. Right-click a panel (for example, the panel at the top of the screen), select <guibutton>Add to Panel...</guibutton> and drag the <guibutton>Lock Screen</guibutton> item to the desired location.
2008-05-20
You can add a <guibutton>Lock Screen</guibutton> button to a panel for easy access. Right-click a panel (for example, the panel at the top of the screen), select <guibutton>Add to Panel...</guibutton> and drag the <guibutton>Lock Screen</guibutton> item to the desired location.
35.
To unlock the screen, move the mouse or press a key. Then, type your password and either press the <keycap>Return</keycap> key or press the <guibutton>Unlock</guibutton> button.
2008-05-20
To unlock the screen, move the mouse or press a key. Then, type your password and either press the <keycap>Return</keycap> key or press the <guibutton>Unlock</guibutton> button.
36.
If more than one person has a user account on your computer and the screen is locked, other users can press the <guibutton>Switch user...</guibutton> button to use the computer, even while the screen is locked. They will be unable to access your currently-open work, and you will be able to switch back to your locked session when they have finished using the computer.
2008-05-20
If more than one person has a user account on your computer and the screen is locked, other users can press the <guibutton>Switch user...</guibutton> button to use the computer, even while the screen is locked. They will be unable to access your currently-open work, and you will be able to switch back to your locked session when they have finished using the computer.
37.
Set up a firewall
2008-05-20
Set up a firewall
38.
You can optionally install a firewall to protect your computer against unauthorized access by people on the Internet or your network. Firewalls block connections to your computer from unknown sources, which helps to prevent security breaches.
2008-05-20
You can optionally install a firewall to protect your computer against unauthorized access by people on the Internet or your network. Firewalls block connections to your computer from unknown sources, which helps to prevent security breaches.
39.
Install the <application>firestarter</application> package from the <quote>Universe</quote> repository (see <ulink type="help" url="ghelp:add-applications">Add Applications</ulink>).
2008-05-20
Install the <application>firestarter</application> package from the <quote>Universe</quote> repository (see <ulink type="help" url="ghelp:add-applications">Add Applications</ulink>).
40.
To start <application>Firestarter</application>, choose <menuchoice><guimenu>System</guimenu><guimenuitem>Administration</guimenuitem><guimenuitem>Firestarter</guimenuitem></menuchoice>, and enter your administrator password when prompted.
2008-05-20
To start <application>Firestarter</application>, choose <menuchoice><guimenu>System</guimenu><guimenuitem>Administration</guimenuitem><guimenuitem>Firestarter</guimenuitem></menuchoice>, and enter your administrator password when prompted.
41.
The <application>Firewall Wizard</application> should run. If it does not, press <menuchoice><guimenu>Firewall</guimenu><guimenuitem>Run Wizard</guimenuitem></menuchoice>.
2008-05-20
The <application>Firewall Wizard</application> should run. If it does not, press <menuchoice><guimenu>Firewall</guimenu><guimenuitem>Run Wizard</guimenuitem></menuchoice>.
42.
Follow the steps in the <application>Firewall Wizard</application>. After completing all of the steps, the firewall should be configured and running.
2008-05-20
Follow the steps in the <application>Firewall Wizard</application>. After completing all of the steps, the firewall should be configured and running.
43.
To check that your firewall is working correctly, make use of an online firewall testing service such as <ulink url="http://www.grc.com/">ShieldsUP</ulink>.
2008-05-20
To check that your firewall is working correctly, make use of an online firewall testing service such as <ulink url="http://www.grc.com/">ShieldsUP</ulink>.
44.
For help and advice on the advanced configuration of <application>Firestarter</application>, see the <ulink url="http://www.fs-security.com/docs.php">Firestarter Online Manual</ulink>.
2008-05-20
For help and advice on the advanced configuration of <application>Firestarter</application>, see the <ulink url="http://www.fs-security.com/docs.php">Firestarter Online Manual</ulink>.
45.
More advanced users may wish to use the UFW firewall, which is installed by default. See the <ulink type="help" url="man:ufw">UFW manual</ulink> for more information.
2008-05-20
More advanced users may wish to use the UFW firewall, which is installed by default. See the <ulink type="help" url="man:ufw">UFW manual</ulink> for more information.
46.
Avoid Internet nuisances and crime
2008-05-20
Avoid Internet nuisances and crime
47.
From time to time, you may be sent an email which carries a virus or links to a fraudulent website. This type of email is very common, and it is important to learn how to deal with it, in order to prevent your computer or your personal details from being compromised or misused.
2008-05-20
From time to time, you may be sent an email which carries a virus or links to a fraudulent website. This type of email is very common, and it is important to learn how to deal with it, in order to prevent your computer or your personal details from being compromised or misused.
48.
Such messages are often received from total strangers. However, sometimes an email may appear to be from someone you know, when really it is not. This is because it is possible to include a fake sender email address in emails.
2008-05-20
Such messages are often received from total strangers. However, sometimes an email may appear to be from someone you know, when really it is not. This is because it is possible to include a fake sender email address in emails.
49.
Unwanted (unsolicited) mail tends to fall in to one of several categories:
2008-05-20
Unwanted (unsolicited) mail tends to fall in to one of several categories:
50.
Spam (junk) email, where people offer unwanted services and products
2008-05-20
Spam (junk) email, where people offer unwanted services and products