Translations by Jen Ockwell

Jen Ockwell has submitted the following strings to this translation. Contributions are visually coded: currently used translations, unreviewed suggestions, rejected suggestions.

138 of 38 results
1.
Keeping Your Computer Safe
2007-10-07
Keeping Your Computer Safe
2.
This section describes how to keep your computer safe from security threats.
2007-10-07
This section describes how to keep your computer safe from security threats.
32.
Lock your screen while away
2007-10-07
Lock your screen while away
33.
Locking your screen prevents other people from accessing your computer while you are away from it. All of your applications and work remain open while the screen is locked, and the screensaver is displayed.
2007-10-07
Locking your screen prevents other people from accessing your computer while you are away from it. All of your applications and work remain open while the screen is locked, and the screensaver is displayed.
38.
Set up a firewall
2007-10-07
Set up a firewall
39.
You can optionally install a firewall to protect your computer against unauthorized access by people on the Internet or your network. Firewalls block connections to your computer from unknown sources, which helps to prevent security breaches.
2007-10-07
You can optionally install a firewall to protect your computer against unauthorised access by people on the Internet or your network. Firewalls block connections to your computer from unknown sources, which helps to prevent security breaches.
41.
To start <application>Firestarter</application>, choose <menuchoice><guimenu>Applications</guimenu><guisubmenu>System</guisubmenu><guimenuitem>Firestarter</guimenuitem></menuchoice>, and enter your administrator password when prompted.
2007-10-07
To start <application>Firestarter</application>, choose <menuchoice><guimenu>Applications</guimenu><guisubmenu>System</guisubmenu><guimenuitem>Firestarter</guimenuitem></menuchoice>, and enter your administrator password when prompted.
42.
The <application>Firewall Wizard</application> should run. If it does not, press <menuchoice><guimenu>Firewall</guimenu><guimenuitem>Run Wizard</guimenuitem></menuchoice>.
2007-10-07
The <application>Firewall Wizard</application> should run. If it does not, press <menuchoice><guimenu>Firewall</guimenu><guimenuitem>Run Wizard</guimenuitem></menuchoice>.
43.
Follow the steps in the <application>Firewall Wizard</application>. After completing all of the steps, the firewall should be configured and running.
2007-10-07
Follow the steps in the <application>Firewall Wizard</application>. After completing all of the steps, the firewall should be configured and running.
44.
To check that your firewall is working correctly, make use of an online firewall testing service such as <ulink url="http://www.grc.com/">ShieldsUP</ulink>.
2007-10-07
To check that your firewall is working correctly, make use of an online firewall testing service such as <ulink url="http://www.grc.com/">ShieldsUP</ulink>.
45.
For help and advice on the advanced configuration of <application>Firestarter</application>, see the <ulink url="http://www.fs-security.com/docs.php">Firestarter Online Manual</ulink>.
2007-10-07
For help and advice on the advanced configuration of <application>Firestarter</application>, see the <ulink url="http://www.fs-security.com/docs.php">Firestarter Online Manual</ulink>.
47.
Avoid Internet nuisances and crime
2007-10-07
Avoid Internet nuisances and crime
48.
From time to time, you may be sent an email which carries a virus or links to a fraudulent website. This type of email is very common, and it is important to learn how to deal with it, in order to prevent your computer or your personal details from being compromised or misused.
2007-10-07
From time to time, you may be sent an email which carries a virus or links to a fraudulent website. This type of email is very common, and it is important to learn how to deal with it, in order to prevent your computer or your personal details from being compromised or misused.
49.
Such messages are often received from total strangers. However, sometimes an email may appear to be from someone you know, when really it is not. This is because it is possible to include a fake sender email address in emails.
2007-10-07
Such messages are often received from total strangers. However, sometimes an email may appear to be from someone you know, when really it is not. This is because it is possible to include a fake sender email address in emails.
50.
Unwanted (unsolicited) mail tends to fall in to one of several categories:
2007-10-07
Unwanted (unsolicited) mail tends to fall in to one of several categories:
51.
Spam (junk) email, where people offer unwanted services and products
2007-10-07
Spam (junk) email, where people offer unwanted services and products
52.
Scam emails, where people pretend to ask for help in exchange for large sums of money
2007-10-07
Scam emails, where people pretend to ask for help in exchange for large sums of money
53.
Phishing email, where the message appears to be from a bank or other online service, asking you to enter your personal and financial details, or passwords.
2007-10-07
Phishing email, where the message appears to be from a bank or other online service, asking you to enter your personal and financial details, or passwords.
54.
Below are some tips for keeping safe online:
2007-10-07
Below are some tips for keeping safe online:
55.
You should never reply to unsolicited mail, or even click on the links in the mail. Doing so usually results in more junk mail being sent to you.
2007-10-07
You should never reply to unsolicited mail, or even click on the links in the mail. Doing so usually results in more junk mail being sent to you.
56.
Never click on links in emails which lead to websites asking for your password or similar. It is possible for the text of the link to give one address, when really it opens up another (possibly dangerous) address. Instead, type the link into your web browser yourself and proceed from there.
2007-10-07
Never click on links in emails which lead to websites asking for your password or similar. It is possible for the text of the link to give one address, when really it opens up another (possibly dangerous) address. Instead, type the link into your web browser yourself and proceed from there.
57.
If a website asks for your financial details, ensure that it is secure. In the <application>Firefox Web browser</application>, secure websites have a <emphasis>yellow</emphasis> address bar with a padlock icon to the right of the address. Click on the padlock to read more information about the security of the website.
2007-10-07
If a website asks for your financial details, ensure that it is secure. In the <application>Firefox Web browser</application>, secure websites have a <emphasis>yellow</emphasis> address bar with a padlock icon to the right of the address. Click on the padlock to read more information about the security of the website.
59.
Make backup copies of your files
2007-10-07
Make backup copies of your files
60.
A problem which you may occasionally encounter is the unexpected loss of some of your work and settings for one reason or another. The causes of such <emphasis>data loss</emphasis> are many and varied; it could be anything from a power cut to accidentally deleting a file. It is highly recommended that you make regular back-up copies of your important files so that, if you do encounter a problem, you will not have lost those files.
2007-10-07
A problem which you may occasionally encounter is the unexpected loss of some of your work and settings for one reason or another. The causes of such <emphasis>data loss</emphasis> are many and varied; it could be anything from a power cut to accidentally deleting a file. It is highly recommended that you make regular back-up copies of your important files so that, if you do encounter a problem, you will not have lost those files.
61.
It is wise to store back-up copies of files separately from your computer; that is, you should make use of some form of file storage which is not permanently attached to your computer. Options include:
2007-10-07
It is wise to store back-up copies of files separately from your computer; that is, you should make use of some form of file storage which is not permanently attached to your computer. Options include:
62.
Writable CDs and DVDs
2007-10-07
Writable CDs and DVDs
63.
External hard disks and flash memory devices
2007-10-07
External hard disks and flash memory devices
64.
Another computer on the network
2007-10-07
Another computer on the network
65.
A simple way of backing-up your files is to manually copy them to a safe location (see above) by using the <application>File Browser</application>.
2007-10-07
A simple way of backing-up your files is to manually copy them to a safe location (see above) by using the <application>File Browser</application>.
66.
Alternatively, you can use a dedicated back-up application, such as <application>HUBackup</application>:
2007-10-07
Alternatively, you can use a dedicated back-up application, such as <application>HUBackup</application>:
68.
To make a backup, press <menuchoice><guimenu>Applications</guimenu><guisubmenu>System</guisubmenu><guimenuitem>Home User Backup</guimenuitem></menuchoice>.
2007-10-07
To make a backup, press <menuchoice><guimenu>Applications</guimenu><guisubmenu>System</guisubmenu><guimenuitem>Home User Backup</guimenuitem></menuchoice>.
69.
Select the files which you would like to make a backup copy of and choose the location which you would like to save the backup to. If you have a CD or DVD writer, it should be present in this list.
2007-10-07
Select the files which you would like to make a backup copy of and choose the location which you would like to save the backup to. If you have a CD or DVD writer, it should be present in this list.
70.
Press <guibutton>Backup</guibutton> and follow the instructions given on-screen.
2007-10-07
Press <guibutton>Backup</guibutton> and follow the instructions given on-screen.
72.
Some general advice on how to keep good back-ups is given below:
2007-10-07
Some general advice on how to keep good back-ups is given below:
73.
Back-up on a regular basis
2007-10-07
Back-up on a regular basis
74.
Always test your back-ups after you make them, to ensure that they have been made correctly
2007-10-07
Always test your back-ups after you make them, to ensure that they have been made correctly
75.
Label your back-ups clearly, and keep them in a safe place
2007-10-07
Label your back-ups clearly, and keep them in a safe place
76.
translator-credits
2009-11-27
This is a dummy translation so that the credits are counted as translated.